- Hardware Solutions To Highly-Adversarial Environments Part 3: Trusted Execution Environment (TEE), SGX, TrustZone and Hardware Security Tokens https://www.cryptologie.net/article/501/hardware-solutions-to-highly-adversarial-environments-part-3-trusted-execution-environment-tee-sgx-trustzone-and-hardware-security-tokens/ 4 comments crypto
Linked pages
- MDS Attacks: Microarchitectural Data Sampling https://mdsattacks.com/#ridl-nng 535 comments
- Plundervolt https://plundervolt.com/ 233 comments
- Signal >> Blog >> Technology preview: Private contact discovery for Signal https://signal.org/blog/private-contact-discovery/ 222 comments
- Foreshadow: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution https://foreshadowattack.eu/ 119 comments
- [1912.04870] V0LTpwn: Attacking x86 Processor Integrity from Software https://arxiv.org/abs/1912.04870 52 comments
- Hardware Wallet & Cold Wallet - Security for Crypto | Ledger https://ledger.com 30 comments
- LVI: Hijacking Transient Execution with Load Value Injection https://lviattack.eu/ 21 comments
- Hardware Solutions To Highly-Adversarial Environments Part 2: HSM vs TPM vs Secure Enclave https://cryptologie.net/article/500/hardware-solutions-to-highly-adversarial-environments-part-2-hsm-vs-tpm-vs-secure-enclave/ 9 comments
- Our Response to Ledger’s #MITBitcoinExpo Findings | by SatoshiLabs | Trezor Blog https://blog.trezor.io/our-response-to-ledgers-mitbitcoinexpo-findings-194f1b0a97d4 0 comments
- [1802.09085] SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution http://arxiv.org/abs/1802.09085 0 comments
- GitHub - microsoft/CCF: Confidential Consortium Framework https://github.com/Microsoft/CCF 0 comments
- Smart Contracts Inside SGX Enclaves: Common Security Bug Patterns – NCC Group Research https://research.nccgroup.com/2020/03/24/smart-contracts-inside-sgx-enclaves-common-security-bug-patterns/ 0 comments
Would you like to stay up to date with Computer science? Checkout Computer science
Weekly.