#trusted-execution-environment

[ follow ]
Information security
fromThe Hacker News
3 days ago

New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves

Physical interposition on DDR5 memory enables extraction of cryptographic and attestation keys from Intel and AMD TEEs, compromising CPU and GPU confidential computing.
fromTheregister
2 months ago

Microsoft shows off custom silicon keeping Azure on lockdown

A key aspect of Microsoft's hardware security is isolation. Encryption keys are stored in an integrated hardware security module (HSM), while VMs are isolated from one another using trusted execution environments (TEE) baked into modern CPUs and GPUs. The control, data, networking, and storage planes are all offloaded to smartNICs and an open source Root of Trust (RoT) module ensures everything is what it purports to be.
Information security
Cryptocurrency
fromHackernoon
1 year ago

Layer-One Confidential Smart Contracts: Architecture, Threats, and Tradeoffs | HackerNoon

Layer-one blockchain solutions enhance transaction efficiency and privacy by integrating consensus and contract execution within isolated environments.
[ Load more ]