Compartmentalization techniques like Trusted Execution Environments (TEEs) are a well-established security strategy to provide increasing integrity and confidentiality for applications, from the edge to the cloud. TEEs are used to protect sensitive data and run security-critical applications on secure execution environments, isolated from the rest of the system. Notwithstanding, over the last few years, TEEs have been proven weak, as either TEEs built upon security-oriented hardware extensions (Arm TrustZone, Intel SGX) or resorting to dedicated secure elements were exploited multiple times. We present and discuss a novel TEE design that leverages reconfigurable FPGA technology. The main novelty relies on leveraging the programm...
Because FPGAs outperform traditional processing cores like CPUs and GPUs in terms of performance per...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
As Internet of Things (IoT) devices are increasingly used in industry and become further integrated ...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on remote Fie...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
General-purpose operating systems (GPOS), such as Linux, encompass several million lines of code. S...
The Internet of Things (IoT) consists of billions of embedded devices connected to the Internet. Sec...
The Internet of Things (IoT) consists of billions of embedded devices connected to the Internet. Se...
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet thei...
Because FPGAs outperform traditional processing cores like CPUs and GPUs in terms of performance per...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
As Internet of Things (IoT) devices are increasingly used in industry and become further integrated ...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on remote Fie...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
Abstract: A trusted execution Environment (TEE) could be a comfy place of a computer’s essential pro...
General-purpose operating systems (GPOS), such as Linux, encompass several million lines of code. S...
The Internet of Things (IoT) consists of billions of embedded devices connected to the Internet. Sec...
The Internet of Things (IoT) consists of billions of embedded devices connected to the Internet. Se...
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet thei...
Because FPGAs outperform traditional processing cores like CPUs and GPUs in terms of performance per...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
As Internet of Things (IoT) devices are increasingly used in industry and become further integrated ...