Llm for soc security: A paradigm shift
As the ubiquity and complexity of system-on-chip (SoC) designs increase across electronic
devices, incorporating security into an SoC design flow poses significant challenges …
devices, incorporating security into an SoC design flow poses significant challenges …
Ryoan: A distributed sandbox for untrusted computation on secret data
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …
SoK: Computer-aided cryptography
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …
formal, machine-checkable approaches to the design, analysis, and implementation of …
A hardware design language for timing-sensitive information-flow security
Information security can be compromised by leakage via low-level hardware features. One
recently prominent example is cache probing attacks, which rely on timing channels created …
recently prominent example is cache probing attacks, which rely on timing channels created …
The unpatchable silicon: a full break of the bitstream encryption of xilinx 7-series {FPGAs}
The security of FPGAs is a crucial topic, as any vulnerability within the hardware can have
severe consequences, if they are used in a secure design. Since FPGA designs are …
severe consequences, if they are used in a secure design. Since FPGA designs are …
{TheHuzz}: Instruction fuzzing of processors using {Golden-Reference} models for finding {Software-Exploitable} vulnerabilities
The increasing complexity of modern processors poses many challenges to existing
hardware verification tools and methodologies for detecting security-critical bugs. Recent …
hardware verification tools and methodologies for detecting security-critical bugs. Recent …
{HardFails}: insights into {software-exploitable} hardware bugs
Modern computer systems are becoming faster, more efficient, and increasingly
interconnected with each generation. Thus, these platforms grow more complex, with new …
interconnected with each generation. Thus, these platforms grow more complex, with new …
Register transfer level information flow tracking for provably secure hardware design
Information Flow Tracking (IFT) provides a formal methodology for modeling and reasoning
about security properties related to integrity, confidentiality, and logical side channel …
about security properties related to integrity, confidentiality, and logical side channel …
A formal foundation for secure remote execution of enclaves
Recent proposals for trusted hardware platforms, such as Intel SGX and the MIT Sanctum
processor, offer compelling security features but lack formal guarantees. We introduce a …
processor, offer compelling security features but lack formal guarantees. We introduce a …
{CacheD}: Identifying {Cache-Based} timing channels in production software
Side-channel attacks recover secret information by analyzing the physical implementation of
cryptosystems based on non-functional computational characteristics, eg time, power, and …
cryptosystems based on non-functional computational characteristics, eg time, power, and …