Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 22 September 2021

Improving Cyber Security

Improving Cyber Security

(p.37) Improving Cyber Security
Advances in Cyber Security

Ruby B. Lee

Fordham University Press

This chapter discusses some promising game-changing strategies for improving cyber security: enabling tailored trustworthy spaces, thwarting attackers with proactive moving target strategies, and rewarding responsible behavior in cyberspace with economic or other incentives. It provides some concrete examples to show that these strategies can be used in hardware design to significantly improve cyber security: by either using hardware to enhance the security provided by software, or improving the trustworthiness of the hardware itself. For example, the Bastion hardware-software architecture can be used to help software systems achieve tailored trustworthy spaces, while the Newcache architecture shows how to build more trustworthy hardware—in this case, secure caches that cannot be used to leak information to adversaries—by using a moving target defense in hardware design. These hardware feasibility examples demonstrate that it is possible to build new hardware features into future commodity processors to enhance cyber security.

Keywords:   cyber security, Bastion hardware-software security architecture, hardware design, software, Newcache architecture, moving target defense

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .