基本信息
浏览量:2
职业迁徙
个人简介
My research is in computer architecture and computer security, and how computer architecture can be used to improve computer security.
I have been professing the hardware-up method for securing computer systems for awhile now. While security is a full-system property, and both software and hardware have to be secure for a system to be secure, I believe that the most practical and principled way to achieve full-system security is to secure the hardware first against attacks, and then systematically harden each layer in the systems stack as we move up the stack through the microarchitecture, ISA interface, system software and application software. This method allows us to avoid security blind spots in the lower levels when designing security at higher levels in the systems stack.
I have been professing the hardware-up method for securing computer systems for awhile now. While security is a full-system property, and both software and hardware have to be secure for a system to be secure, I believe that the most practical and principled way to achieve full-system security is to secure the hardware first against attacks, and then systematically harden each layer in the systems stack as we move up the stack through the microarchitecture, ISA interface, system software and application software. This method allows us to avoid security blind spots in the lower levels when designing security at higher levels in the systems stack.
研究兴趣
论文共 11 篇作者统计合作学者相似作者
按年份排序按引用量排序主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2023, CF 2023pp.154-163, (2023)
IEEE Computer Architecture Lettersno. 2 (2023): 173-176
IEEE Microno. 4 (2023): 53-61
arXiv (Cornell University) (2022)
引用0浏览0引用
0
0
Matthew Maycock,Simha Sethumadhavan
IEEE COMPUTER ARCHITECTURE LETTERSno. 1 (2016): 21-24
加载更多
作者统计
合作学者
合作机构
D-Core
- 合作者
- 学生
- 导师
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn