In Hardware We Trust? From TPM to Enclave Computing on RISC-V | 0 | 0.34 | 2021 |
CURE: A Security Architecture with CUstomizable and Resilient Enclaves | 0 | 0.34 | 2021 |
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures | 0 | 0.34 | 2021 |
Developing Privacy-preserving AI Systems: The Lessons learned | 0 | 0.34 | 2020 |
On The Security Of Strong Memristor-Based Physically Unclonable Functions | 0 | 0.34 | 2020 |
Trusted Execution Environments: Properties, Applications, and Challenges | 1 | 0.34 | 2020 |
INVITED: AI Utopia or Dystopia - On Securing AI Platforms | 0 | 0.34 | 2020 |
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security | 0 | 0.34 | 2020 |
In Hardware We Trust: Gains and Pains of Hardware-assisted Security | 0 | 0.34 | 2019 |
SANCTUARY - ARMing TrustZone with User-space Enclaves. | 0 | 0.34 | 2019 |
Towards Fine Grained Network Flow Prediction. | 0 | 0.34 | 2018 |