Description: backdoortolerance.org is your first and best source for all of the information you’re looking for. From general topics to more of what you would expect to find here, backdoortolerance.org has it all. We hope you find what you are searching for!
University College London / Enigmabridge / Masaryk University
For the first time, we introduce a high-level architecture that can tolerate multiple, colluding malicious hardware components , and a new approach for managing the risk of compromises in cryptographic hardware modules.
Existing high-assurance systems cannot reliably maintain their security properties in the presence of compromised hardware components. In this work, we challenge this perception and demonstrate how trusted, high-assurance hardware can be built from untrusted and potentially malicious components.