Confidential computing is an emerging technique that provides users and third-party developers with an isolated and transparent execution environment. To support this …
H Huang, F Zhang, S Yan, T Wei… - … Symposium on Secure …, 2024 - ieeexplore.ieee.org
Arm TrustZone is the most popular hardware-assisted Trusted Execution Environment (TEE) solution on mobile and Internet of Things (IoT) devices. However, this well-established TEE …
The increasing integration of diverse co-processors and peripherals within mobile Arm System-on-Chips (SoCs) presents significant challenges for secure and efficient device I/O …
A Dhar, C Thorens, LM Lazier, L Cavigelli - arXiv preprint arXiv …, 2024 - arxiv.org
Cloud workloads have dominated generative AI based on large language models (LLM). Specialized hardware accelerators, such as GPUs, NPUs, and TPUs, play a key role in AI …
M Moore, A Zenla - arXiv preprint arXiv:2501.04580, 2025 - arxiv.org
Organizations run applications on cloud infrastructure shared between multiple users and organizations. Popular tooling for this shared infrastructure, including Docker and …
As personal computers and mobile devices have become mainstream, ensuring the security of sensitive data has become crucial. However, as systems grow more complex …
HARDENING AND ADAPTING TRUSTED EXECUTION ENVIRONMENTS FOR EMERGING PLATFORMS A Dissertation Presented to The Academic Faculty By Page 1 HARDENING AND …