Tamper resistance mechanisms for secure embedded systems
S Ravi, A Raghunathan… - … Conference on VLSI …, 2004 - ieeexplore.ieee.org
Security is a concern in the design of a wide range of embedded systems. Extensive
research has been devoted to the development of cryptographic algorithms that provide the …
research has been devoted to the development of cryptographic algorithms that provide the …
Memory encryption: A survey of existing techniques
M Henson, S Taylor - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Memory encryption has yet to be used at the core of operating system designs to provide
confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …
confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …
Keystone: An open framework for architecting trusted execution environments
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …
cloud servers and encompass a range of cost, power constraints, and security threat model …
[PDF][PDF] Intel SGX explained
V Costan - IACR Cryptol, EPrint Arch, 2016 - people.cs.rutgers.edu
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
Sanctum: Minimal hardware extensions for strong software isolation
Sanctum offers the same promise as Intel's Software Guard Extensions (SGX), namely
strong provable isolation of software modules running concurrently and sharing resources …
strong provable isolation of software modules running concurrently and sharing resources …
Shielding applications from an untrusted cloud with haven
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …
the provider's staff and its globally distributed software/hardware platform not to expose any …
VC3: Trustworthy data analytics in the cloud using SGX
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …
computations in the cloud while kee** their code and data secret, and ensuring the …
[PDF][PDF] Innovative instructions and software model for isolated execution.
For years the PC community has struggled to provide secure solutions on open platforms.
Intel has developed innovative new technology to enable SW developers to develop and …
Intel has developed innovative new technology to enable SW developers to develop and …
Pinocchio: Nearly practical verifiable computation
To instill greater confidence in computations outsourced to the cloud, clients should be able
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …
Graviton: Trusted execution environments on {GPUs}
We propose Graviton, an architecture for supporting trusted execution environments on
GPUs. Graviton enables applications to offload security-and performance-sensitive kernels …
GPUs. Graviton enables applications to offload security-and performance-sensitive kernels …