06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8.5 Summary<br />

concluded in this chapter that a better way <strong>for</strong>ward would be to change the architecture<br />

of the Java virtual machine. However, in the context of this thesis we showed that current<br />

architecture can be hardened at the cost of a computational penalty.<br />

210

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!