
and Personal Systems.
9
When the team was first formed, their focus was on
offensive hacking and they became known as IBM’s “ethical hackers.”
8
Their
efforts now are geared more toward testing and defending against network
threats that exploit system vulnerabilities. (Appendix A summarizes these
network threats.) Described next are the results of the Watson GSAL’s col-
laborative efforts and groundbreaking research in the application of hard-
ware support to enable trust.
Embedded Security Subsystem Version 1.0
When the Watson GSAL and the Personal Systems business segment
began working together on a hardware-based means of user authentica-
tion, they initially ...