Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3605769.3623998acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
keynote

In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security

Published:26 November 2023Publication History

ABSTRACT

Hardware has been long considered as the source and root of trust in computing, but the nature of its trust characteristics and views on trust technologies have evolved over time. The infancy of hardware security and trust, decades ago, emerged in the days when security attacks were limited in number and sophistication, the computing environment was relatively simple and homogeneous, the population of connected users was small, and the use cases where computing played a key role were very far from ubiquitous. Today, the situation is diametrically different from the early days of hardware trust and trusted computing. The talk will provide an overview of the evolution of technology and use cases in this area, examine persistent challenges, analyze mistakes we made along the way, look into the intersections with adjacent areas of research and practice and finally outline some promising directions for the next generation of trusted technologies.

Index Terms

  1. In Search of Trust: 30 Years of Evolution of Trusted Computing and Hardware Security

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ASHES '23: Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security
      November 2023
      138 pages
      ISBN:9798400702624
      DOI:10.1145/3605769

      Copyright © 2023 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 November 2023

      Check for updates

      Qualifiers

      • keynote

      Acceptance Rates

      Overall Acceptance Rate6of20submissions,30%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA
    • Article Metrics

      • Downloads (Last 12 months)57
      • Downloads (Last 6 weeks)4

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader