An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
[PDF][PDF] Intel SGX explained
V Costan - IACR Cryptol, EPrint Arch, 2016 - people.cs.rutgers.edu
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
architecture that aims to provide integrity and privacy guarantees to security-sensitive …
Shielding applications from an untrusted cloud with haven
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …
the provider's staff and its globally distributed software/hardware platform not to expose any …
Scalable zero knowledge via cycles of elliptic curves
Non-interactive zero-knowledge proofs of knowledge for general NP statements are a
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …
Hardware mechanisms for memory authentication: A survey of existing techniques and engines
R Elbaz, D Champagne, C Gebotys, RB Lee… - … Science IV: Special …, 2009 - Springer
Trusted computing platforms aim to provide trust in computations performed by sensitive
applications. Verifying the integrity of memory contents is a crucial security service that these …
applications. Verifying the integrity of memory contents is a crucial security service that these …
AEGIS: Architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip AEGIS processor which can be used to build
computing systems secure against both physical and software attacks. Our architecture …
computing systems secure against both physical and software attacks. Our architecture …
VAULT: Reducing paging overheads in SGX with efficient integrity verification structures
M Taassori, A Shafiee… - Proceedings of the Twenty …, 2018 - dl.acm.org
Intel's SGX offers state-of-the-art security features, including confidentiality, integrity, and
authentication (CIA) when accessing sensitive pages in memory. Sensitive pages are …
authentication (CIA) when accessing sensitive pages in memory. Sensitive pages are …
Verifying computations with state
When a client outsources a job to a third party (eg, the cloud), how can the client check the
result, without re-executing the computation? Recent work in proof-based verifiable …
result, without re-executing the computation? Recent work in proof-based verifiable …
Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly
B Rogers, S Chhabra, M Prvulovic… - 40th Annual IEEE/ACM …, 2007 - ieeexplore.ieee.org
In today's digital world, computer security issues have become increasingly important. In
particular, researchers have proposed designs for secure processors which utilize hardware …
particular, researchers have proposed designs for secure processors which utilize hardware …
Efficient memory integrity verification and encryption for secure processors
Secure processors enable new sets of applications such as commercial grid computing,
software copy-protection, and secure mobile agents by providing security from both physical …
software copy-protection, and secure mobile agents by providing security from both physical …