Projects per year
Abstract
Trusted execution environments (TEEs) enabled research in scenarios where highest-privileged attackers had precise control over systems and microarchitecture. Insights gained from such attacks facilitated the discovery of non-TEE attacks, such as Spectre (as well as Foreshadow from within virtual machines).
Original language | English |
---|---|
Article number | 9107096 |
Pages (from-to) | 18-27 |
Number of pages | 10 |
Journal | IEEE Security & Privacy |
Volume | 18 |
Issue number | 5 |
DOIs | |
Publication status | Published - 1 Sept 2020 |
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law
Projects
- 1 Finished
-
Leakage-Free - Hardware-Software Information Flow Analysis for Leakage-Free Code Generation
1/10/18 → 30/09/20
Project: Research project