Department

Computer Science and Cybersecurity

Document Type

Poster

Abstract

As organizations increasingly adopt Zero Trust security models to mitigate cyber threats, the focus is often placed on network, identity, data protection, and software layers. In this discussion, the hardware layer upon which the system is built is often overlooked. However, once the underlying hardware is compromised, no amount of software-based security can fully protect against advanced attacks. To address this gap, this project explores how Zero Trust principles can be applied to processors to ensure hardware-level trust validation and built-in defense mechanisms from the ground up. Specifically, we discuss key capabilities that processors must support to demonstrate compliance with the pillars of the Department of Defense (DoD) Zero Trust framework.

Publication Date

Spring 4-15-2025

Comments

Spring 2025: Student Research Conference

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.