Computer systems often provide hardware support for isolation mechanisms like privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features, brings a risk of introducing new such side-channel attacks. This paper studies the problem of extending a processor with new features without weakening the security of the isolation mechanisms that the processor offers. We propose to use full abstraction as a formal criterion for the security of a processor extension, and we instantiate that criterion...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Secure enclave technology has during the last decade emerged as an important hardware security primi...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Recent attacks have broken process isolation by exploiting microarchitectural side channels that all...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
The isolation among physically co-located virtual machines is an important prerequisite for ensuring...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Secure enclave technology has during the last decade emerged as an important hardware security primi...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Recent attacks have broken process isolation by exploiting microarchitectural side channels that all...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
The isolation among physically co-located virtual machines is an important prerequisite for ensuring...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Secure enclave technology has during the last decade emerged as an important hardware security primi...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...