An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

[PDF][PDF] Intel SGX explained

V Costan - IACR Cryptol, EPrint Arch, 2016 - people.cs.rutgers.edu
Abstract Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel
architecture that aims to provide integrity and privacy guarantees to security-sensitive …

Shielding applications from an untrusted cloud with haven

A Baumann, M Peinado, G Hunt - ACM Transactions on Computer …, 2015 - dl.acm.org
Today's cloud computing infrastructure requires substantial trust. Cloud users rely on both
the provider's staff and its globally distributed software/hardware platform not to expose any …

Scalable zero knowledge via cycles of elliptic curves

E Ben-Sasson, A Chiesa, E Tromer, M Virza - Algorithmica, 2017 - Springer
Non-interactive zero-knowledge proofs of knowledge for general NP statements are a
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …

Hardware mechanisms for memory authentication: A survey of existing techniques and engines

R Elbaz, D Champagne, C Gebotys, RB Lee… - … Science IV: Special …, 2009 - Springer
Trusted computing platforms aim to provide trust in computations performed by sensitive
applications. Verifying the integrity of memory contents is a crucial security service that these …

AEGIS: Architecture for tamper-evident and tamper-resistant processing

GE Suh, D Clarke, B Gassend, M Van Dijk… - ACM International …, 2003 - dl.acm.org
We describe the architecture for a single-chip AEGIS processor which can be used to build
computing systems secure against both physical and software attacks. Our architecture …

VAULT: Reducing paging overheads in SGX with efficient integrity verification structures

M Taassori, A Shafiee… - Proceedings of the Twenty …, 2018 - dl.acm.org
Intel's SGX offers state-of-the-art security features, including confidentiality, integrity, and
authentication (CIA) when accessing sensitive pages in memory. Sensitive pages are …

Verifying computations with state

B Braun, AJ Feldman, Z Ren, S Setty… - Proceedings of the …, 2013 - dl.acm.org
When a client outsources a job to a third party (eg, the cloud), how can the client check the
result, without re-executing the computation? Recent work in proof-based verifiable …

Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly

B Rogers, S Chhabra, M Prvulovic… - 40th Annual IEEE/ACM …, 2007 - ieeexplore.ieee.org
In today's digital world, computer security issues have become increasingly important. In
particular, researchers have proposed designs for secure processors which utilize hardware …

Efficient memory integrity verification and encryption for secure processors

GE Suh, D Clarke, B Gasend… - … . 36th Annual IEEE …, 2003 - ieeexplore.ieee.org
Secure processors enable new sets of applications such as commercial grid computing,
software copy-protection, and secure mobile agents by providing security from both physical …