For decades, software security has been the primary focus in securing our computing platforms. Hardware was always assumed trusted, and inherently served as the foundation, and thus the root of trust, of our systems. This has been further leveraged in developing hardware-based dedicated security extensions and architectures to protect software from attacks exploiting software vulnerabilities such as memory corruption. However, the recent outbreak of microarchitectural attacks has shaken these long-established trust assumptions in hardware entirely, thereby threatening the security of all of our computing platforms and bringing hardware and microarchitectural security under scrutiny. These attacks have undeniably revealed the grave consequen...
In the last decade, multi-threaded systems and resource sharing have brought a number of technologie...
Cyber-security is now a critical concern in a wide range of embedded computing modules, communicatio...
The increasing reliance on digital technologies and connected systems has amplified the need for sec...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Computer security has largely been the domain of software for the last few decades. Although this ap...
Over the past decades, there has been a growing number of attacks compromising the security of compu...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
The discrepancy between the abstract model used to reason about the security of computer systems and...
As computer systems grow more and more complicated, various optimizations can unintentionally introd...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
In the last decade, multi-threaded systems and resource sharing have brought a number of technologie...
Cyber-security is now a critical concern in a wide range of embedded computing modules, communicatio...
The increasing reliance on digital technologies and connected systems has amplified the need for sec...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Computer security has largely been the domain of software for the last few decades. Although this ap...
Over the past decades, there has been a growing number of attacks compromising the security of compu...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
The discrepancy between the abstract model used to reason about the security of computer systems and...
As computer systems grow more and more complicated, various optimizations can unintentionally introd...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
Shared microarchitectural state is a target for side-channel attacks that leverage timing measuremen...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
In the last decade, multi-threaded systems and resource sharing have brought a number of technologie...
Cyber-security is now a critical concern in a wide range of embedded computing modules, communicatio...
The increasing reliance on digital technologies and connected systems has amplified the need for sec...