Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information

Document Type

Conference Proceeding

Publication Date



There are many current classifications and taxonomies relating to computer security. One missing classification is the Trustworthiness of Information being received by the security system, which we define. This new classification along with Timeliness of Detection and Security level of the Security System present motivation for hardware-based security solutions. Including hardware is not an automatic solution to the limitations of software solutions. Advantages are only gained from hardware through design that ensures at least First-hand Information, dedicated monitors, explicit hardware communication, dedicated storage, and dedicated security processors. Abstract © Springer


The "Link to Full Text" on this page loads the PDF of the chapter, furnished open-access through the Springer Nature SharedIt content-sharing initiative. The publisher retains permissions to re-use and distribute this paper in LNCS vol. 5019.



Source Publication

Lecture Notes in Computer Science, vol. 5019