Useful security properties arise from sealing data to specific units of code. Modern processors featuring Intel’s TXT and AMD’s SVM achieve this by a process of measured and trusted execution. Only code which has the correct measurement can access the data, and this code runs in an environment trusted from observation and interference. We discuss the history of attempts to provide security for hardware platforms, and review the literature in the field. We propose some applications which would benefit from use of trusted execution, and discuss functionality enabled by trusted execution. We present in more detail a novel variation on Diffie-Hellman key exchange which removes some reliance on random number generation. We present a mode...
Formal verification carries the promise of absolute correctness, guaranteed at the highest level of...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
A plethora of major security incidents---in which personal identifiers belonging to hundreds of mill...
In this project, we added support to the OCaml interpreter to use the protections afforded by Intel’...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Processing and storage of confidential or critical information is an every day occurrence in computi...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Abstract. Useful security properties arise from sealing data to specific units of code. Modern proce...
This thesis addresses vulnerabilities in current Trusted Computing architecture by exploring a desig...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
Formal verification carries the promise of absolute correctness, guaranteed at the highest level of...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
A plethora of major security incidents---in which personal identifiers belonging to hundreds of mill...
In this project, we added support to the OCaml interpreter to use the protections afforded by Intel’...
This thesis deals with the analysis and design of trusted computing platforms. Trusted computing tec...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Processing and storage of confidential or critical information is an every day occurrence in computi...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Abstract. Useful security properties arise from sealing data to specific units of code. Modern proce...
This thesis addresses vulnerabilities in current Trusted Computing architecture by exploring a desig...
In recent years, trusted execution environments (TEEs) have seen increasing deployment in computing ...
Formal verification carries the promise of absolute correctness, guaranteed at the highest level of...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...