International audienceA variety of applications are executing on a large untrusted computing base, which includes the operating system, hypervisor, firmware, and hardware. This large computing base is becoming complex and unverifiable. This untrusted computing base problem opens a way for a malicious application to steal secrets of a security-critical application by compromising the untrusted computing base. To resolve the untrusted computing base problem, computer architectures have introduced a concept of the trusted execution environment, which aim to ensure the sensitive data to be stored and processed in an isolated environment. Existing popular trusted execution environments are relying on hardware to isolate the environments without ...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
The increasing need for security has caused system designers to consider placing some security suppo...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
International audienceA variety of applications are executing on a large untrusted computing base, w...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
International audienceComputer systems software and hardware architec-tures have become increasingly...
Trusted Execution Environments provide improved security guarantees with a smaller attack surface at...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
The increasing need for security has caused system designers to consider placing some security suppo...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
International audienceA variety of applications are executing on a large untrusted computing base, w...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
peer-reviewedTrusted Computing is a relatively new approach to computer security in which a system s...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
International audienceComputer systems software and hardware architec-tures have become increasingly...
Trusted Execution Environments provide improved security guarantees with a smaller attack surface at...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
In this paper, we present SobTrA, a Software-based Trust Anchor for ARM Cortex-A processors to prote...
The increasing need for security has caused system designers to consider placing some security suppo...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...