Confidential Computing is the protection of data in use from access or modification by any unauthorized agent, including privileged software. For example, in Intel SGX (Client and Scalable versions) and TDX, AMD SEV, Arm CCA, and IBM Ultravisor this protection is implemented via access control policies. Some of these architectures also include memory protection schemes relying on cryptography, to protect against physical attacks. We review and classify such schemes, from academia and industry, according to protection levels corresponding of adversaries with varying capabilities, budget, and strategy. The building blocks of all memory protection schemes are encryption and integrity primitives and modes of operation, as well as anti-replay ...
As enterprises migrate their data to cloud infrastructure, they increasingly need a flexible, scalab...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
Increases in data production and growing demands for more computing power leads to the current trend...
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic ...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
In the few years since the Raspberry Pi was released in 2012, countless microcomputers based on the ...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Recently there is a growing interest in both the architecture and the security community to create a...
Abstract Authenticated encryption has long been a vital operation in cryptography by its ability to ...
Since their market launch in late 2015, trusted hardware enclaves have revolutionised the computing ...
The security goals of cloud providers and users include memory confidentiality and integrity, which ...
We are interested in addressing a series of existing and plausible threats to cybersecurity where th...
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure...
Traditionally, cryptographic algorithms are designed under the so-called black-box model, which cons...
As enterprises migrate their data to cloud infrastructure, they increasingly need a flexible, scalab...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
Increases in data production and growing demands for more computing power leads to the current trend...
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic ...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Advancements in attacks with physical access to commodity hardware has resulted in a general consens...
In the few years since the Raspberry Pi was released in 2012, countless microcomputers based on the ...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Recently there is a growing interest in both the architecture and the security community to create a...
Abstract Authenticated encryption has long been a vital operation in cryptography by its ability to ...
Since their market launch in late 2015, trusted hardware enclaves have revolutionised the computing ...
The security goals of cloud providers and users include memory confidentiality and integrity, which ...
We are interested in addressing a series of existing and plausible threats to cybersecurity where th...
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure...
Traditionally, cryptographic algorithms are designed under the so-called black-box model, which cons...
As enterprises migrate their data to cloud infrastructure, they increasingly need a flexible, scalab...
Errors in hardware and software lead to vulnerabilities that can be exploited by attackers. Proposed...
Increases in data production and growing demands for more computing power leads to the current trend...