Computer systems often provide hardware support for isolation mechanisms such as privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken, the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features brings a risk of introducing new software-based side-channel attacks. This article studies the problem of extending a processor with new features without weakening the security of the isolation mechanisms that the processor offers. Our solution is heavily based on techniques from research on programming languages. More specifically, we propose to u...
This paper analyzes the vulnerability space arising in Trusted Execution Environments (TEEs) when in...
Hardware-based enclave protection mechanisms, such as Intel’s SGX, ARM’s TrustZone, and Apple’s Secu...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Recent attacks have broken process isolation by exploiting microarchitectural side channels that all...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Secure enclave technology has during the last decade emerged as an important hardware security primi...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
This paper analyzes the vulnerability space arising in Trusted Execution Environments (TEEs) when in...
Hardware-based enclave protection mechanisms, such as Intel’s SGX, ARM’s TrustZone, and Apple’s Secu...
Software systems are growing ever larger. Early software systems were singular units developed by sm...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Recent attacks have broken process isolation by exploiting microarchitectural side channels that all...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Secure enclave technology has during the last decade emerged as an important hardware security primi...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
This paper analyzes the vulnerability space arising in Trusted Execution Environments (TEEs) when in...
Hardware-based enclave protection mechanisms, such as Intel’s SGX, ARM’s TrustZone, and Apple’s Secu...
Software systems are growing ever larger. Early software systems were singular units developed by sm...