Reference 1
Introspection in hardware.
To match network connections to the application-layer while being isolated and undetected from the operating system or the hypervisor.
Firewalls:
software-based firewall: installed on a target computer.
This paper: external firewalls with added ability to analyze memory of the target.
Reference 1 D. Y. Deng, Flexible and efficient accelerator architecture for runtime monitoring. Cornell University, 2016. ↩
If you could revise
the fundmental principles of
computer system design
to improve security...
... what would you change?