Single-chip microprocessor that communicates directly using light
Data transport across short electrical wires is limited by both bandwidth and power density,
which creates a performance bottleneck for semiconductor microchips in modern computer …
which creates a performance bottleneck for semiconductor microchips in modern computer …
Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing
Intel has introduced a hardware-based trusted execution environment, Intel Software Guard
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …
Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a …
The cost of application-class processing: Energy and performance analysis of a Linux-ready 1.7-GHz 64-bit RISC-V core in 22-nm FDSOI technology
The open-source RISC-V instruction set architecture (ISA) is gaining traction, both in industry
and academia. The ISA is designed to scale from microcontrollers to server-class …
and academia. The ISA is designed to scale from microcontrollers to server-class …
Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols
U Banerjee, TS Ukyab, AP Chandrakasan - ar** mitigate the efficiency obstacles given by the downsizing …
[PDF][PDF] Instruction sets should be free: The case for risc-v
Custom systems-on-a-chip (SoCs), where the processors and caches are a small part of the
chip, are becoming ubiquitous; it is rare today to find an electronics product at any scale that …
chip, are becoming ubiquitous; it is rare today to find an electronics product at any scale that …
Mi6: Secure enclaves in a speculative out-of-order processor
Recent attacks have broken process isolation by exploiting microarchitectural side channels
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …
Jolt: Snarks for virtual machines via lookups
Abstract Succinct Non-interactive Arguments of Knowledge (SNARKs) allow an untrusted
prover to establish that it correctly ran some “witness-checking procedure” on a witness. A …
prover to establish that it correctly ran some “witness-checking procedure” on a witness. A …
{HardFails}: insights into {software-exploitable} hardware bugs
Modern computer systems are becoming faster, more efficient, and increasingly
interconnected with each generation. Thus, these platforms grow more complex, with new …
interconnected with each generation. Thus, these platforms grow more complex, with new …
HDFI: Hardware-assisted data-flow isolation
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …
defense mechanisms are inadequate; in general, the software-based approaches are not …