In the last decade, security architectures became prominent which protect sensitive data in isolated execution environments, called enclaves or Trusted Execution Environments (TEEs), that are backed by hardware-assisted security mechanisms. Relying on hardware mechanisms allows enclave architectures to shrink the software that is inherently trusted, called Trusted Computing Base (TCB), to a bare minimum which stands in stark contrast to the large code base that must be trusted in a commodity operating system. Moreover, in contrast to architectures which deploy security hardware in dedicated computer chips, e.g., Trusted Platform Modules (TPMs) or smart cards, enclave architectures are deeply integrated into the main processor and thus can u...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
The electronics industry is incredibly fast-moving and has greatly impacted our society. One of its ...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
Secure enclave technology has during the last decade emerged as an important hardware security primi...
The emergence of the open-source RISC-V ISA empowers developers and engineers, device manufactures, ...
Recent attacks have broken process isolation by exploiting microarchitectural side channels that all...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
MI6 is an aggressive, speculative out-of-order processor to support Secure Enclaves, which restore ...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
The electronics industry is incredibly fast-moving and has greatly impacted our society. One of its ...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
Secure enclave technology has during the last decade emerged as an important hardware security primi...
The emergence of the open-source RISC-V ISA empowers developers and engineers, device manufactures, ...
Recent attacks have broken process isolation by exploiting microarchitectural side channels that all...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
MI6 is an aggressive, speculative out-of-order processor to support Secure Enclaves, which restore ...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
The electronics industry is incredibly fast-moving and has greatly impacted our society. One of its ...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...