This whitepaper explains the following:
• Effective isolation between processes of varying levels of trust is a cornerstone of hardware security.
• Recently discovered vulnerabilities that affect several processor architectures allow processes of lower privilege to read portions of kernel data that should be protected from such access.
• How the current efforts to ensure hardware security during the design of modern microprocessors is inadequate at finding the most elusive security flaws.
• How these types of security flaws can be found early in the design lifecycle by properly implementing a Secure Design Lifecycle (SDL) using hardware security solutions from Tortuga Logic.
To learn more, please click on the button below to download the whitepaper.