Abstract
This chapter introduces the main features of secure processor architectures, as an extension of general-processor architectures. It first gives examples of real-world attacks on existing processor architectures, which further motivates research and design of secure architectures. It next presents features of general-processor architectures. It then introduces secure processor architectures, their features, especially concerning different execution levels and privileges, and gives examples of existing academic and commercial architectures. The chapter also lists secure processor architecture assumptions and limitations of what the architectures can achieve.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Szefer, J. (2019). Secure Processor Architectures. In: Principles of Secure Processor Architecture Design. Synthesis Lectures on Computer Architecture. Springer, Cham. https://doi.org/10.1007/978-3-031-01760-5_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-01760-5_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-00632-6
Online ISBN: 978-3-031-01760-5
eBook Packages: Synthesis Collection of Technology (R0)eBColl Synthesis Collection 8