Abstract:
An in-depth analysis of the 80/spl times/86 processor families identifies architectural properties that may have unexpected, and undesirable, results in secure computer s...Show MoreMetadata
Abstract:
An in-depth analysis of the 80/spl times/86 processor families identifies architectural properties that may have unexpected, and undesirable, results in secure computer systems. In addition, reported implementation errors in some processor versions render them undesirable for secure systems because of potential security and reliability problems. We discuss the imbalance in scrutiny for hardware protection mechanisms relative to software, and why this imbalance is increasingly difficult to justify as hardware complexity increases. We illustrate this difficulty with examples of architectural subtleties and reported implementation errors.<>
Published in: Proceedings 1995 IEEE Symposium on Security and Privacy
Date of Conference: 08-10 May 1995
Date Added to IEEE Xplore: 06 August 2002
Print ISBN:0-8186-7015-0
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Cybersecurity ,
- Implementation Error ,
- Protective Mechanism ,
- Formal Methods ,
- Security Policy ,
- Contextual Processing ,
- Software Components ,
- Task Switching ,
- Incorrect Results ,
- Access Rights ,
- Hardware Components ,
- Lack Of Reports ,
- Trust In Systems ,
- Security Mechanisms ,
- Penetration Test ,
- Data Cache ,
- Millions Of Users ,
- Unexpected Interactions ,
- Cache Hit ,
- Security Flaws ,
- Pentium ,
- Hardware Security ,
- Aspects Of Architecture
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Cybersecurity ,
- Implementation Error ,
- Protective Mechanism ,
- Formal Methods ,
- Security Policy ,
- Contextual Processing ,
- Software Components ,
- Task Switching ,
- Incorrect Results ,
- Access Rights ,
- Hardware Components ,
- Lack Of Reports ,
- Trust In Systems ,
- Security Mechanisms ,
- Penetration Test ,
- Data Cache ,
- Millions Of Users ,
- Unexpected Interactions ,
- Cache Hit ,
- Security Flaws ,
- Pentium ,
- Hardware Security ,
- Aspects Of Architecture