We present Blinded Memory (BliMe), a way to realize efficient and secure outsourced computation. BliMe consists of a novel and minimal set of ISA extensions that uses taint tracking to ensure the confidentiality of sensitive (client) data even in the presence of server malware, run-time attacks, and side-channel attacks. To secure outsourced computation, the BliMe extensions can be used together with an attestable, fixed-function hardware security module (HSM) and an encryption engine that provides atomic decrypt-and-taint and encrypt-and-untaint operations. The HSM engages in an attestation and key agreement protocol with the client. It provides the resulting client-specific keys to the encryption engine. Clients rely on remote attestati...
Useful security properties arise from sealing data to specific units of code. Modern processors feat...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophisticat...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
Increases in data production and growing demands for more computing power leads to the current trend...
Computing infrastructures are challenging and expensive to maintain. This led to the growth of cloud...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
International audienceExciting new capabilities of modern trusted hardware technologies allow for th...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
We discuss practical details and basic scalability for two recent ideas for hardware encryption for ...
Trusted execution environments (TEEs) provide an environment for running workloads in the cloud with...
Today, electronic devices have been widely deployed in our daily lives, basic infrastructure such as...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Fully Homomorphic Encryption (FHE) and Trusted Execution Environ-ments (TEEs) are complementing appr...
Useful security properties arise from sealing data to specific units of code. Modern processors feat...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophisticat...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted...
Increases in data production and growing demands for more computing power leads to the current trend...
Computing infrastructures are challenging and expensive to maintain. This led to the growth of cloud...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
International audienceExciting new capabilities of modern trusted hardware technologies allow for th...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
We discuss practical details and basic scalability for two recent ideas for hardware encryption for ...
Trusted execution environments (TEEs) provide an environment for running workloads in the cloud with...
Today, electronic devices have been widely deployed in our daily lives, basic infrastructure such as...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Fully Homomorphic Encryption (FHE) and Trusted Execution Environ-ments (TEEs) are complementing appr...
Useful security properties arise from sealing data to specific units of code. Modern processors feat...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
Cyberattacks are the fastest growing crime in the U.S., and they are increasing in size, sophisticat...