Hardware-based cryptographic implementations utilize countermeasures to
...
Spectre attacks enable an attacker to access restricted data in an
appli...
Spectre vulnerabilities violate our fundamental assumptions about
archit...
We describe Swivel, a new compiler framework for hardening WebAssembly (...
Microarchitectural Data Sampling (MDS) is a set of hardware vulnerabilit...
The adversarial model presented by trusted execution environments (TEEs)...
After years of development, FPGAs are finally making an appearance on
mu...
Trusted Platform Module (TPM) serves as a hardware-based root of trust t...
Recently, out-of-order execution, an important performance optimization ...
In early 2018, Meltdown first showed how to read arbitrary kernel memory...