The ever increasing popularity and availability of Trusted Execution
Env...
WebAssembly (Wasm) is a low-level binary format for web applications, wh...
RISC-V is an emerging technology, with applications ranging from embedde...
The adoption of machine learning solutions is rapidly increasing across ...
Trusted execution environments are quickly rising in popularity as they
...
Secret-dependent timing behavior in cryptographic implementations has
re...
Recent research in micro-architectural attacks has uncovered a variety o...
Implementations of cryptographic libraries have been scrutinized for
sec...
The ongoing trend of moving data and computation to the cloud is met wit...
Microarchitectural side channel attacks have been very prominent in secu...
One reason for not adopting cloud services is the required trust in the ...
After years of development, FPGAs are finally making an appearance on
mu...
Trusted Platform Module (TPM) serves as a hardware-based root of trust t...
The growing security threat of microarchitectural attacks underlines the...
Caches have become the prime method for unintended information extractio...
Modern microarchitectures incorporate optimization techniques such as
sp...
Over the past years, literature has shown that attacks exploiting the
mi...
Microarchitectural side channels expose unprotected software to informat...
Over the past decade, side-channels have proven to be significant and
pr...
Cache attacks exploit memory access patterns of cryptographic
implementa...