A survey on risc-v security: Hardware and architecture

T Lu - arXiv preprint arXiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …

Towards a formally verified security monitor for VM-based confidential computing

W Ozga - Proceedings of the 12th International Workshop on …, 2023 - dl.acm.org
Confidential computing is a key technology for isolating high-assurance applications from
the large amounts of untrusted code typical in modern systems. Existing confidential …

Privacy preserving or trapping?

X Sun, B Ye - AI & SOCIETY, 2024 - Springer
The development and application of artificial intelligence (AI) technology has raised many
concerns about privacy violations in the public. Thus, privacy-preserving computation …

[PDF][PDF] An OP-TEE Energy-Efficient Task Scheduling Approach Based on Mobile Application Characteristics.

H Wang, X Hao, S Ji, J Zheng, Y Ma… - Intelligent Automation & …, 2023 - cdn.techscience.cn
Trusted Execution Environment (TEE) is an important part of the security architecture of
modern mobile devices, but its secure interaction process brings extra computing burden to …

Dependability of Future Edge-AI Processors: Pandora's Box

MD Gomony, A Gebregiorgis, M Fieback… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
This paper addresses one of the directions of the HORIZON EU CONVOLVE project being
dependability of smart edge processors based on computation-in-memory and emerging …

The First 20 Years of IEEE Security & Privacy

S Peisert - IEEE Security & Privacy, 2023 - ieeexplore.ieee.org
IEEE Security & Privacy published Volume 1, Issue 1 20 years ago in January/February
2003. This year, beginning with this issue of IEEE Security & Privacy, we aim to celebrate …

Sustaining the Trust of an IoT Infrastructure

A Papakotoulas, A Terzidis… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) have emerged as a promising solution for various
applications in smart systems, mobile networking, and computing, especially in the Internet …

[PDF][PDF] Enhancing Security and Performance in Trusted Execution Environments

P YUHALA - 2024 - yuhala.github.io
Cloud computing permits companies to easily scale their infrastructure to meet changing
demand, providing reduced costs and improved scalability. However, for cloud tenants …

DECH: A Novel Attack Pattern of Cloud Environment and Its Countermeasures

H Gao, L Li, H Lin, J Wan, D Deng… - 2021 IEEE 5th …, 2021 - ieeexplore.ieee.org
Cloud computing has become more and more vital in digital world as a basic technique of
many services. As the foundation of cloud computing, the cloud platform hosts various cloud …

[PDF][PDF] Secure Smartphone

Y Donon, F Künzler, P Jasinski… - Trends in Data …, 2023 - library.oapen.org
Secure smartphones highlight the privacy and data safety issues in off-the-shelf
smartphones and the need for secure smartphones to address these concerns. The article …