Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

[PDF][PDF] Keystone: A framework for architecting tees

D Lee, D Kohlbrenner, S Shinde, D Song… - arXiv preprint arXiv …, 2019 - academia.edu
Trusted execution environments (TEEs) are becoming a requirement across a wide range of
platforms, from embedded sensors to cloud servers, which encompass a wide range of cost …

A formal treatment of backdoored pseudorandom generators

Y Dodis, C Ganesh, A Golovnev, A Juels… - Advances in Cryptology …, 2015 - Springer
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a
saboteur chooses a PRG instance for which she knows a trapdoor that allows prediction of …

Self-encrypting deception: weaknesses in the encryption of solid state drives

C Meijer, B Van Gastel - 2019 IEEE Symposium on Security …, 2019 - ieeexplore.ieee.org
We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by
reverse engineering their firmware. These drives were produced by three manufacturers …

Not-so-random numbers in virtualized Linux and the Whirlwind RNG

A Everspaugh, Y Zhai, R Jellinek… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Virtualized environments are widely thought to cause problems for software-based random
number generators (RNGs), due to use of virtual machine (VM) snapshots as well as fewer …

Ensuring high-quality randomness in cryptographic key generation

H Corrigan-Gibbs, W Mu, D Boneh, B Ford - Proceedings of the 2013 …, 2013 - dl.acm.org
The security of any cryptosystem relies on the secrecy of the system's secret keys. Yet,
recent experimental work demonstrates that tens of thousands of devices on the Internet use …

Secure PRNG seeding on commercial off-the-shelf microcontrollers

A Van Herrewege, V van der Leest, A Schaller… - Proceedings of the 3rd …, 2013 - dl.acm.org
The generation of high quality random numbers is crucial to many cryptographic
applications, including cryptographic protocols, secret of keys, nonces or salts. Their values …

Software only, extremely compact, Keccak-based secure PRNG on ARM Cortex-M

A Van Herrewege, I Verbauwhede - Proceedings of the 51st Annual …, 2014 - dl.acm.org
The ability to generate secure random numbers is fundamental to the security of
cryptographic protocols. Random Number Generators (RNGs) start to appear in recent …

Recoverable random numbers in an internet of things operating system

T Yoo, JS Kang, Y Yeom - Entropy, 2017 - mdpi.com
Over the past decade, several security issues with Linux Random Number Generator
(LRNG) on PCs and Androids have emerged. The main problem involves the process of …

Recommendations for randomness in the operating system, or how to keep evil children out of your pool and other random facts

H Corrigan-Gibbs, S Jana - 15th Workshop on Hot Topics in Operating …, 2015 - usenix.org
Common misconceptions about randomness underlie the design and implementation of
randomness sources in popular operating systems. We debunk these fallacies with a survey …