Single-chip microprocessor that communicates directly using light

C Sun, MT Wade, Y Lee, JS Orcutt, L Alloatti… - Nature, 2015 - nature.com
Data transport across short electrical wires is limited by both bandwidth and power density,
which creates a performance bottleneck for semiconductor microchips in modern computer …

Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing

S Lee, MW Shih, P Gera, T Kim, H Kim… - 26th USENIX Security …, 2017 - usenix.org
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …

The cost of application-class processing: Energy and performance analysis of a Linux-ready 1.7-GHz 64-bit RISC-V core in 22-nm FDSOI technology

F Zaruba, L Benini - IEEE Transactions on Very Large Scale …, 2019 - ieeexplore.ieee.org
The open-source RISC-V instruction set architecture (ISA) is gaining traction, both in industry
and academia. The ISA is designed to scale from microcontrollers to server-class …

[PDF][PDF] Instruction sets should be free: The case for risc-v

K Asanović, DA Patterson - EECS Department, University …, 2014 - people.eecs.berkeley.edu
Custom systems-on-a-chip (SoCs), where the processors and caches are a small part of the
chip, are becoming ubiquitous; it is rare today to find an electronics product at any scale that …

Mi6: Secure enclaves in a speculative out-of-order processor

T Bourgeat, I Lebedev, A Wright, S Zhang… - Proceedings of the …, 2019 - dl.acm.org
Recent attacks have broken process isolation by exploiting microarchitectural side channels
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …

Jolt: Snarks for virtual machines via lookups

A Arun, S Setty, J Thaler - Annual International Conference on the Theory …, 2024 - Springer
Abstract Succinct Non-interactive Arguments of Knowledge (SNARKs) allow an untrusted
prover to establish that it correctly ran some “witness-checking procedure” on a witness. A …

{HardFails}: insights into {software-exploitable} hardware bugs

G Dessouky, D Gens, P Haney, G Persyn… - 28th USENIX Security …, 2019 - usenix.org
Modern computer systems are becoming faster, more efficient, and increasingly
interconnected with each generation. Thus, these platforms grow more complex, with new …

HDFI: Hardware-assisted data-flow isolation

C Song, H Moon, M Alam, I Yun, B Lee… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …