![]() In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar.In 2015 IEEE Symposium on Security and Privacy. S $ A: A shared cache attack that works across cores and defies VM sandboxing–and its application to AES. Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar.Hardware Evaluation of the AES Finalists. Tetsuya Ichikawa, Tomomi Kasuya, and Mitsuru Matsui.In 2011 IEEE Symposium on Security and Privacy. Cache games–bringing access-based cache attacks on AES to practice. David Gullasch, Endre Bangerter, and Stephan Krenn.Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O’keeffe, Mark L Stillwell, 2016.Serpent: A Proposal for the Advanced Encryption Standard. Trustzone: Integrated hardware and software security. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process. Announcing Development of a Federal Information Processing Standard for Advanced Encryption Standard. ![]() Finally, we propose a set of guidelines to facilitate putting these secure computing technologies into practice. In particular, we explore how design considerations across applications, hardware, and security mechanisms must be combined to overcome fundamental limitations in current technologies so that we can minimize performance overhead while achieving sufficient threat model coverage. Our study exposes the need for software-hardware-security codesign to realize efficient and effective solutions of securing user data. In this paper, we present a systemization of knowledge (SoK) on these design considerations and trade-offs using several prominent security technologies. Each technique provides some degree of security, but differs with respect to threat coverage, performance overheads, as well as implementation and deployment challenges. ![]() Researchers and practitioners are exploring various security technologies to meet user demand such as trusted execution environments (e.g., Intel SGX, ARM TrustZone), homomorphic encryption, and differential privacy. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems. Users are demanding increased data security. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |