Abstract
This chapter covers basics of computer security needed for understanding secure processor architecture designs. It begins with a discussion of the trusted computing base, security threats to a system, and discussion of threat models. A brief overview of information leaks and side channels is also included in the chapter as it will be needed to understand the side-channel attack protections that secure processor architectures needs. This chapter then dives into security concepts of confidentiality, integrity, and availability. It also explains basics of symmetric-key cryptography, public-key cryptography, and secure hashes. A short section on importance of good sources of randomness is included. The chapter closes with a short overview of physically unclonable functions (PUFs) and their applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Szefer, J. (2019). Basic Computer Security Concepts. In: Principles of Secure Processor Architecture Design. Synthesis Lectures on Computer Architecture. Springer, Cham. https://doi.org/10.1007/978-3-031-01760-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-01760-5_2
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-00632-6
Online ISBN: 978-3-031-01760-5
eBook Packages: Synthesis Collection of Technology (R0)eBColl Synthesis Collection 8