Where does security stand? New vulnerabilities vs. trusted computing
Document Type
Article
Date of Original Version
11-1-2007
Abstract
How can we ensure that platform hardware, firmware, and software work in concert to withstand rapidly evolving security threats? Architectural innovations bring performance gains but can also create new security vulnerabilities. In this panel discussion, from the 2007 Workshop on Computer Architecture Research Directions, Shay Gueron, Geoffrey Strongin, and Jean-Pierre Seifert assess the current state of security and discuss possible routes toward trusted computing. © 2007 IEEE.
Publication Title, e.g., Journal
IEEE Micro
Volume
27
Issue
6
Citation/Publisher Attribution
Gueron, Shay, Jean P. Seifert, Geoffrey Strongin, Derek Chiou, Resit Sendag, and Joshua J. Yi. "Where does security stand? New vulnerabilities vs. trusted computing." IEEE Micro 27, 6 (2007): 25-35. doi: 10.1109/MM.2007.112.