Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
Trusted execution environment: What it is, and what it is not
M Sabt, M Achemlal… - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Nowadays, there is a trend to design complex, yet secure systems. In this context, the
Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted …
Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted …
Design and verification of the arm confidential compute architecture
The increasing use of sensitive private data in computing is matched by a growing concern
regarding data privacy. System software such as hypervisors and operating systems are …
regarding data privacy. System software such as hypervisors and operating systems are …
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …
recent attacks that exploit microarchitectural features in shared hardware, especially as they …
L4 microkernels: The lessons from 20 years of research and deployment
G Heiser, K Elphinstone - ACM Transactions on Computer Systems …, 2016 - dl.acm.org
The L4 microkernel has undergone 20 years of use and evolution. It has an active user and
developer community, and there are commercial versions that are deployed on a large scale …
developer community, and there are commercial versions that are deployed on a large scale …
Comprehensive formal verification of an OS microkernel
We present an in-depth coverage of the comprehensive machine-checked formal verification
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …
Komodo: Using verification to disentangle secure-enclave hardware from software
A Ferraiuolo, A Baumann, C Hawblitzel… - Proceedings of the 26th …, 2017 - dl.acm.org
Intel SGX promises powerful security: an arbitrary number of user-mode enclaves protected
against physical attacks and privileged software adversaries. However, to achieve this, Intel …
against physical attacks and privileged software adversaries. However, to achieve this, Intel …
Ironclad apps:{End-to-End} security via automated {Full-System} verification
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …
guarantee that every instruction executed on that machine adheres to a formal abstract …
Adoption of mobile devices/services-searching for answers with the UTAUT
C Carlsson, J Carlsson, K Hyvonen… - Proceedings of the …, 2006 - ieeexplore.ieee.org
The future of mobile telephony is expected to rely on mobile services and the use of mobile
services will be an integral part of the revenues to be generated by third generation mobile …
services will be an integral part of the revenues to be generated by third generation mobile …
Towards ai-assisted synthesis of verified dafny methods
Large language models show great promise in many domains, including programming. A
promise is easy to make but hard to keep, and language models often fail to keep their …
promise is easy to make but hard to keep, and language models often fail to keep their …