Design Methodology and Metrics for Robust and Highly Qualified Security Modules in Trusted Environments
Cyberattacks and cybercriminal activities constitute one of the biggest threats in the modern digital era, and the frequency, efficiency, and severity of attacks have grown over the years. Designers and producers of digital systems try to counteract such issues by exploiting increasingly robust and...
Main Authors: | Luca Crocetti, Pietro Nannipieri, Stefano Di Matteo, Sergio Saponara |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-11-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/23/4843 |
Similar Items
-
Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling
by: Trong-Thuc Hoang, et al.
Published: (2022-01-01) -
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
by: Nikolaos Koutroumpouchos, et al.
Published: (2021-01-01) -
TeeJam: Sub-Cache-Line Leakages Strike Back
by: Florian Sieck, et al.
Published: (2023-12-01) -
Research on the trusted environment of container cloud based on the TPCM
by: LIU Guojie, ZHANG Jianbiao, LI Zheng, et al.
Published: (2021-08-01) -
Basic Approaches to Testing of Multifunctional Hardware Software Information Security Tools
by: E. A. Belyaeva
Published: (2011-03-01)