CHAPTER
9 Trustworthy Hardware: Bedrock
Overview
• 9.2 Instruction Set Architectures
• 9.3 Supervisors with Rings and Things
• 9.4 Controlling Memory: Mapping, Capabilities, and Tagging
Learning Objectives
• Explain why hardware is the foundation of trustworthy systems.
• Compare how hardware security relates to the two types of processor instruction sets.
• Describe how supervisor mode and rings support a trustworthy system.
• Explain memory protection techniques and how they work with supervisor modes.
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.