The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized hardware, which is readily available across modern datacenters through disaggregated infrastructure. On the other hand, trusted execution environments (TEEs), one of the most promising recent developments in hardware security, can only protect code confined in the CPU, limiting TEEs’ potential and applicability to a handful of applications. We observe that the TEEs’ hardware trusted computing base (TCB) is fixed at design time, which in practice leads to using untrusted software to employ peripherals in TEEs. Based on this observation, we propose composite enclaves with a configurable hardware and software TCB, allowing enclaves access to multip...
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on remote Fie...
The emergence of the open-source RISC-V ISA empowers developers and engineers, device manufactures, ...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Compartmentalization techniques like Trusted Execution Environments (TEEs) are a well-established s...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Secure enclave technology has during the last decade emerged as an important hardware security primi...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on remote Fie...
The emergence of the open-source RISC-V ISA empowers developers and engineers, device manufactures, ...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Compartmentalization techniques like Trusted Execution Environments (TEEs) are a well-established s...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Secure enclave technology has during the last decade emerged as an important hardware security primi...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on remote Fie...
The emergence of the open-source RISC-V ISA empowers developers and engineers, device manufactures, ...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...