Software cannot protect software: an argument for dedicated hardware in security and a categorization of the trustworthiness of information

  • Authors:
  • Matthew Judge;Paul Williams;Yong Kim;Barry Mullins

  • Affiliations:
  • Air Force Institute of Technology, Wright Patterson AFB, OH;Air Force Institute of Technology, Wright Patterson AFB, OH;Air Force Institute of Technology, Wright Patterson AFB, OH;Air Force Institute of Technology, Wright Patterson AFB, OH

  • Venue:
  • WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

There are many current classifications and taxonomies relatingto computer security. One missing classification is the Trustworthinessof Information being received by the security system, which wedefine. This new classification along with Timeliness of Detection andSecurity level of the Security System present motivation for hardware-based security solutions. Including hardware is not an automatic solutionto the limitations of software solutions. Advantages are only gained fromhardware through design that ensures at least First-hand Information,dedicated monitors, explicit hardware communication, dedicated storage,and dedicated security processors.