<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.scipedia.com/wd/index.php?action=history&amp;feed=atom&amp;title=Sethumadhavan_Waksman_2010a</id>
		<title>Sethumadhavan Waksman 2010a - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://www.scipedia.com/wd/index.php?action=history&amp;feed=atom&amp;title=Sethumadhavan_Waksman_2010a"/>
		<link rel="alternate" type="text/html" href="https://www.scipedia.com/wd/index.php?title=Sethumadhavan_Waksman_2010a&amp;action=history"/>
		<updated>2026-04-21T22:03:50Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.0-wmf.10</generator>

	<entry>
		<id>https://www.scipedia.com/wd/index.php?title=Sethumadhavan_Waksman_2010a&amp;diff=208721&amp;oldid=prev</id>
		<title>Scipediacontent: Scipediacontent moved page Draft Content 842260543 to Sethumadhavan Waksman 2010a</title>
		<link rel="alternate" type="text/html" href="https://www.scipedia.com/wd/index.php?title=Sethumadhavan_Waksman_2010a&amp;diff=208721&amp;oldid=prev"/>
				<updated>2021-02-03T20:19:05Z</updated>
		
		<summary type="html">&lt;p&gt;Scipediacontent moved page &lt;a href=&quot;/public/Draft_Content_842260543&quot; class=&quot;mw-redirect&quot; title=&quot;Draft Content 842260543&quot;&gt;Draft Content 842260543&lt;/a&gt; to &lt;a href=&quot;/public/Sethumadhavan_Waksman_2010a&quot; title=&quot;Sethumadhavan Waksman 2010a&quot;&gt;Sethumadhavan Waksman 2010a&lt;/a&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='1' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 20:19, 3 February 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan='2' style='text-align: center;' lang='en'&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Scipediacontent</name></author>	</entry>

	<entry>
		<id>https://www.scipedia.com/wd/index.php?title=Sethumadhavan_Waksman_2010a&amp;diff=208720&amp;oldid=prev</id>
		<title>Scipediacontent: Created page with &quot; == Abstract ==  Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because micr...&quot;</title>
		<link rel="alternate" type="text/html" href="https://www.scipedia.com/wd/index.php?title=Sethumadhavan_Waksman_2010a&amp;diff=208720&amp;oldid=prev"/>
				<updated>2021-02-03T20:19:02Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot; == Abstract ==  Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because micr...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors are vulnerable to insider attacks that can catastrophically compromise security, integrity and privacy of computer systems. In this paper, we describe several methods to strengthen the fundamental assumption about trust in microprocessors. By employing practical, lightweight attack detectors within a microprocessor, we show that it is possible to protect against malicious logic embedded in microprocessor hardware. We propose and evaluate two area-efficient hardware methods - TrustNet and DataWatch - that detect attacks on microprocessor hardware by knowledgeable, malicious insiders. Our mechanisms leverage the fact that multiple components within a microprocessor (e.g., fetch, decode pipeline stage etc.) must necessarily coordinate and communicate to execute even simple instructions, and that any attack on a microprocessor must cause erroneous communications between micro architectural subcomponents used to build a processor. A key aspect of our solution is that TrustNet and DataWatch are themselves highly resilient to corruption. We demonstrate that under realistic assumptions, our solutions can protect pipelines and on-chip cache hierarchies at negligible area cost and with no performance impact. Combining TrustNet and DataWatch with prior work on fault detection has the potential to provide complete coverage against a large class of microprocessor attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Original document ==&lt;br /&gt;
&lt;br /&gt;
The different versions of the original document can be found in:&lt;br /&gt;
&lt;br /&gt;
* [http://dx.doi.org/10.1109/sp.2010.19 http://dx.doi.org/10.1109/sp.2010.19]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cs.columbia.edu/%7Esimha/cal/pubs/pdfs/TEMP_Oakland10.pdf http://www.cs.columbia.edu/%7Esimha/cal/pubs/pdfs/TEMP_Oakland10.pdf]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf http://www.cs.columbia.edu/~waksman/PDFs/Oakland_2010.pdf],&lt;br /&gt;
: [http://oakland31.cs.virginia.edu/slides/waksman.pdf http://oakland31.cs.virginia.edu/slides/waksman.pdf],&lt;br /&gt;
: [http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000005504715 http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000005504715],&lt;br /&gt;
: [https://ieeexplore.ieee.org/document/5504715 https://ieeexplore.ieee.org/document/5504715],&lt;br /&gt;
: [https://dblp.uni-trier.de/db/conf/sp/sp2010.html#WaksmanS10 https://dblp.uni-trier.de/db/conf/sp/sp2010.html#WaksmanS10],&lt;br /&gt;
: [http://oakland10.cs.virginia.edu/slides/waksman.pdf http://oakland10.cs.virginia.edu/slides/waksman.pdf],&lt;br /&gt;
: [http://www.utdallas.edu/~gxm112130/CE7V80SP16/tamper-evident.pdf http://www.utdallas.edu/~gxm112130/CE7V80SP16/tamper-evident.pdf],&lt;br /&gt;
: [https://dl.acm.org/citation.cfm?id=1849973 https://dl.acm.org/citation.cfm?id=1849973],&lt;br /&gt;
: [https://doi.org/10.1109/SP.2010.19 https://doi.org/10.1109/SP.2010.19],&lt;br /&gt;
: [https://doi.ieeecomputersociety.org/10.1109/SP.2010.19 https://doi.ieeecomputersociety.org/10.1109/SP.2010.19],&lt;br /&gt;
: [http://ieeexplore.ieee.org/document/5504715/citations http://ieeexplore.ieee.org/document/5504715/citations],&lt;br /&gt;
: [http://castl.cs.columbia.edu/papers/oakland10_temp.pdf http://castl.cs.columbia.edu/papers/oakland10_temp.pdf],&lt;br /&gt;
: [http://a51.nl/storage/pdf/TEMP_Oakland10.pdf http://a51.nl/storage/pdf/TEMP_Oakland10.pdf],&lt;br /&gt;
: [https://academic.microsoft.com/#/detail/1988712140 https://academic.microsoft.com/#/detail/1988712140]&lt;br /&gt;
&lt;br /&gt;
* [http://xplorestaging.ieee.org/ielx5/5504620/5504699/05504715.pdf?arnumber=5504715 http://xplorestaging.ieee.org/ielx5/5504620/5504699/05504715.pdf?arnumber=5504715],&lt;br /&gt;
: [http://dx.doi.org/10.1109/sp.2010.19 http://dx.doi.org/10.1109/sp.2010.19]&lt;/div&gt;</summary>
		<author><name>Scipediacontent</name></author>	</entry>

	</feed>