Hardware-Based Trusted Computing Architectures for Isolation and Attestation.

IEEE Transactions on Computers(2018)

引用 210|浏览195
暂无评分
摘要
Attackers target many different types of computer systems in use today, exploiting software vulnerabilities to take over the device and make it act maliciously. Reports of numerous attacks have been published, against the constrained embedded devices of the Internet of Things, mobile devices like smartphones and tablets, high-performance desktop and server environments, as well as complex industri...
更多
查看译文
关键词
Computer architecture,Software,Hardware,Software measurement,Encryption,Computers
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要