O'Reilly logo

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time by O. Sami Saydjari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER

9   Trustworthy Hardware: Bedrock

Overview

•   9.1 Foundation of Trust

•   9.2 Instruction Set Architectures

•   9.3 Supervisors with Rings and Things

•   9.4 Controlling Memory: Mapping, Capabilities, and Tagging

•   9.4.1 Memory Mapping

•   9.4.2 Capabilities

•   9.4.3 Tagging

•   9.5 Software in Hardware

•   9.5.1 Microcode

•   9.5.2 Firmware

•   9.5.3 Secure Bootstrapping

•   9.6 Buses and Controllers

Learning Objectives

•   Explain why hardware is the foundation of trustworthy systems.

•   Compare how hardware security relates to the two types of processor instruction sets.

•   Describe how supervisor mode and rings support a trustworthy system.

•   Explain memory protection techniques and how they work with supervisor modes.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required