Trusted Computing: Application Development, Testing, and Analysis for Optimal Security

April 22, 2019

Processor-specific security features and existing security libraries can help military system engineers ensure that application software is trusted and secure.

Previous Download
When Trash Misses the Bin
When Trash Misses the Bin

Next White Paper
Using LinuxBoot with Secure Coreboot
Using LinuxBoot with Secure Coreboot