What is it about?

Many systems rely on finite state machines - this work proposed mechanisms to secure these finite state machines from attacks.

Featured Image

Why is it important?

Cybersecurity should be a conversation at every level of design - this work enables anyone to automatically implement some attack mitigation mechanisms.

Perspectives

We've always been told to optimize systems to their most condensed form - this work dispells that notion in favor of increased security.

Dr Mike Borowczak
University of Wyoming

Read the Original

This page is a summary of: Mitigating early-boot information leakage using S*FSM, IET Computers & Digital Techniques, January 2019, the Institution of Engineering and Technology (the IET),
DOI: 10.1049/iet-cdt.2018.5186.
You can read the full text:

Read

Contributors

The following have contributed to this page