GUEST ESSAY: The case for leveraging hardware to shore up security — via a co-processor
The Last Watchdog
MARCH 31, 2022
Seeing the flaws continue year after year, the industry began linking authentication of valid software components to the underlying hardware, or the “root of trust”. This approach allows for compromised software to be identified during the authentication process.
Let's personalize your content