Type of Publication: Article in Collected Edition
Advances and Throwbacks in Hardware-assisted Security - CASES: Special Session - Towards Secure Computer Architecture: Understanding Security Vulnerabilities and Emerging Attacks for Better Defenses
- Ferdinand Brasser; Lucas Davi; Abhijitt Dhavlle; Tommaso Frassetto; Sai Manoj Pudukotai Dinakarrao; Setareh Rafatirad; Ahmad-Reza Sadeghi; Avesta Sasan; Hossein Sayadi; Shaza Zeitouni; Houman Homayoun
- Title of Anthology:
- Proc. of IEEE International Conference on Compilers, Architecture, and Synthesis for Embedded Systems
- Publication Date:
- Link to complete version:
Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern software systems. Over the past two decades we have witnessed various hardware security solutions and trends from Trusted Platform Modules (TPM), performance counters for security, ARM's TrustZone, and Physically Unclonable Functions (PUFs), to very recent advances such as Intel's Software Guard Extension (SGX). Unfortunately, these solutions are rarely used by third party developers, make strong trust assumptions (including in manufacturers), are too expensive for small constrained devices, do not easily scale, or suffer from information leakage. Academic research has proposed a variety of solutions, in hardware security architectures, these advancements are rarely deployed in practice.