by Jakub Szefer on Oct 10, 2022 | Tags: Architecture, Quantum Computing, Security
Introduction When thinking of security and quantum computers, many people may automatically think of using quantum computers for attacks on classical computers, by use of the Grover’s and Shor’s algorithms running on the quantum computers to break a number of existing...
Read more...
by Jaime H. Moreno, Hubertus Franke, Paul Crumley, Mengmei Ye on May 25, 2022 | Tags: Composable Systems, Datacenters, Security, Virtualization
Sharing computing resources in a microprocessor among multiple tenants (users, tasks) through virtualization, as currently done in datacenters, edge, and embedded environments, conflicts with the need to provide security, isolation, and performance stability. This...
Read more...
by Dmitry Ponomarev on Feb 17, 2022 | Tags: Conferences, fhe, hardware accelerator, Security
In an earlier blog post, we summarized advances in hardware and architecture security research in the early part of 2021; this post highlights contributions that appeared in the later part of 2021 that are of interest to our community. In this post, we focus on papers...
Read more...
by Caroline Trippel on Sep 27, 2021 | Tags: formal methods, program synthesis, Security
This blog post samples a growing body of research which leverages formal methods techniques to solve computer architecture challenges. While certainly not exhaustive, it is meant to serve as a starting point for further reading and brainstorming. Constructing Formal...
Read more...
by Gururaj Saileshwar on Sep 15, 2021 | Tags: Cache, Computer Architecture, Randomization, Security
There is a battle ongoing in the realm of secure caches. Cache side-channels are a serious security problem as they allow an attacker to monitor a victim program’s execution and leak sensitive data like encryption keys, confidential IP, etc. A potent class of such...
Read more...