12.4 Hardware-assisted Security