Running Secure Server Software on Insecure Hardware without a Parachute

  • Monday, February 24, 2014 | 3:40 PM – 4:00 PM | West | Room: 3012

View all Sessions

In this session we will look in depth into what happens when we throw away the assumption that server hardware is trusted. We discuss advanced techniques for protecting software on untrusted clients and how to apply them to servers running on untrusted hardware. This includes anti-reverse engineering methods, secure key management and how to design a system for renewal.


This document was retrieved from on Thu, 27 Jun 2019 04:39:59 -0400.