
Proceedings Paper
Hardware security kernel for cyber-defenseFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
Hardware assisted operating systems have their origins in microprogramming from the early 1970’s. In 2014, Renesas marketed a hardware based operating system in the R-IN32M microprocessor. It is time for cybersecurity to consider the security benefits of moving hypervisor and OS features into hardware. A trusted computing base architecture using a hardware state machine separation kernel is the future of cybersecurity. In this paper, we will research a hardware state machine as the trusted computing base. A traditional operating system provides security for applications software. We are interested in a state machine monitor to secure the execution of instructions and provide separation kernel features.
Paper Details
Date Published: 10 May 2019
PDF: 12 pages
Proc. SPIE 11013, Disruptive Technologies in Information Sciences II, 110130J (10 May 2019); doi: 10.1117/12.2513224
Published in SPIE Proceedings Vol. 11013:
Disruptive Technologies in Information Sciences II
Misty Blowers; Russell D. Hall; Venkateswara R. Dasari, Editor(s)
PDF: 12 pages
Proc. SPIE 11013, Disruptive Technologies in Information Sciences II, 110130J (10 May 2019); doi: 10.1117/12.2513224
Show Author Affiliations
Patrick Jungwirth, U.S. Army Research Lab. (United States)
James Ross, U.S. Army Research Lab. (United States)
Barry Secrest, U.S. Army Research Lab. (United States)
James Ross, U.S. Army Research Lab. (United States)
Barry Secrest, U.S. Army Research Lab. (United States)
Thomas Barnett, U.S. Army Aviation and Missile Command (United States)
Philip Chan, U.S. Army Research Lab. (United States)
Philip Chan, U.S. Army Research Lab. (United States)
Published in SPIE Proceedings Vol. 11013:
Disruptive Technologies in Information Sciences II
Misty Blowers; Russell D. Hall; Venkateswara R. Dasari, Editor(s)
© SPIE. Terms of Use
