Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Steve Harris Weingart is active.

Publication


Featured researches published by Steve Harris Weingart.


Computer Networks | 1999

Building a high-performance, programmable secure coprocessor

Sean W. Smith; Steve Harris Weingart

Unsecure computational environments threaten many financial cryptography implementations, and other sensitive computation. High-performance secure coprocessors can address these threats. However, using this technology for practical security solutions requires overcoming numerous technical and business obstacles. These obstacles motivate building a high-performance secure coprocessor that balances security with easy third-party programmability—but these obstacles also provide many design challenges. This paper discusses some of issues we faced when attempting to build such a device.


financial cryptography | 1998

Using a High-Performance, Programmable Secure Coprocessor

Sean W. Smith; Elaine R. Palmer; Steve Harris Weingart

Unsecure computational environments threaten many financial cryptography implementations, and other sensitive computation. High-performance secure coprocessors can address these threats. However, using this technology for practical security solutions requires overcoming numerous technical and business obstacles. These obstacles motivate building a high-performance secure coprocessor that balances security with easy third-party programmability—but these obstacles also provide many design challenges. This paper discusses some of issues we faced when attempting to build such a device.


cryptographic hardware and embedded systems | 2000

Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences

Steve Harris Weingart

As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing systems to steal or modify assets become more likely. This technology requires constant review and improvement, just as other competitive technologies need review to stay at the leading edge. This paper describes known physical attacks, ranging from simple attacks that require little skill or resource, to complex attacks that require trained, technical people and considerable resources. Physical security methods to deter or prevent these attacks are presented. The intent is to match protection methods with the attack methods in terms of complexity and cost. In this way cost effective protection can be produced across a wide range of systems and needs. Specific technical mechanisms now in use are shown, as well as mechanisms proposed for future use. Common design problems and solutions are discussed with consideration for manufacturing.


annual computer security applications conference | 1990

An evaluation system for the physical security of computing systems

Steve Harris Weingart; Steve R. White; William C. Arnold; Glen Paul Double

Physical security technology is being used more often to protect the integrity of computing systems and the assets they contain. A physical security rating system is defined in terms of the difficulty of mounting a successful physical attack against it, quality assurance documentation and system testing. An evaluation system is presented for determining adequate physical security, as a function of the environment in which the system is placed and the value of the assets resident in the system.<<ETX>>


Archive | 1991

Data protection by detection of intrusion into electronic assemblies

Glen Paul Double; Steve Harris Weingart


Archive | 1997

Securely downloading and executing code from mutually suspicious authorities

Sean W. Smith; Steve Harris Weingart


Archive | 1986

Tamper-resistant packaging for protection of information stored in electronic circuitry

Steve Harris Weingart


Archive | 1997

Establishing and employing the provable untampered state of a device

Sean W. Smith; Steve Harris Weingart


Archive | 1991

Introduction to the Citadel Architecture: Security in Physically Exposed Environments

Steven Robert White; Steve Harris Weingart; William C. Arnold; Elaine R. Palmer


Archive | 1997

Hardware access control locking

Mario Bizzaro; Vincenzo Condorelli; Michel Henri Theodore Hack; Jeffrey Kravitz; Mark Lindemann; Elaine R. Palmer; Gianluca Pedrina; Sean W. Smith; Steve Harris Weingart

Researchain Logo
Decentralizing Knowledge