0:00:00 | the big picture it's a |
---|
0:00:02 | it's a hardware approach to security of a hyphen systems which are |
---|
0:00:07 | you know systems that have very strict |
---|
0:00:10 | in a you have to enforce very strict policy about where information for like for |
---|
0:00:14 | a bank system we wanna make sure the |
---|
0:00:16 | no private key isn't for the public not working for aeroplane you know fly control |
---|
0:00:19 | system you wanna make sure the user |
---|
0:00:21 | in a network doesn't conflict or fly control so traditionally people kind of work at |
---|
0:00:26 | in uplink system application the programming |
---|
0:00:29 | programming language level trend of |
---|
0:00:32 | you know ensure these policies at high level but we're actually designing hardware |
---|
0:00:37 | that enforce these policies you know abigail also them we kind of build up from |
---|
0:00:41 | that and in doing so you can kind of at every stage from a bottom-up |
---|
0:00:45 | approach for the very secure system that's you know probably enforces a wannabes policies |
---|
0:00:51 | the prominences it is very just in that are whiskers that just because these programming |
---|
0:00:56 | languages in a print system attraction scarily |
---|
0:00:59 | i mean obviously don't count for all the flows in hardware that could potentially happen |
---|
0:01:02 | in people design harbour for low power performance things like that generally don't consider security |
---|
0:01:08 | when the design however so this kind of approach that you book is a harbour |
---|
0:01:12 | and say this is probably you know not gonna we give you know leak your |
---|
0:01:16 | t to the networking and things like that so |
---|
0:01:19 | you know department of antennae and you know anybody that really need a very strict |
---|
0:01:24 | very strict a guarantee about where they're information spline will benefit from this |
---|