Intel SGX Explained. V Costan, S Devadas IACR Cryptology ePrint Archive 2016, 86, 2016 | 2655 | 2016 |
Sanctum: Minimal Hardware Extensions for Strong Software Isolation. V Costan, IA Lebedev, S Devadas USENIX Security Symposium, 857-874, 2016 | 796 | 2016 |
Secure processors part I: Background, taxonomy for secure enclaves and Intel SGX architecture V Costan, I Lebedev, S Devadas Foundations and Trends® in Electronic Design Automation 11 (1-2), 1-248, 2017 | 53 | 2017 |
The trusted execution module: Commodity general-purpose trusted computing V Costan, LFG Sarmenta, M Van Dijk, S Devadas International Conference on Smart Card Research and Advanced Applications …, 2008 | 53 | 2008 |
Secure processors part II: Intel SGX security analysis and MIT sanctum architecture V Costan, I Lebedev, S Devadas Foundations and Trends® in Electronic Design Automation 11 (3), 249-361, 2017 | 47 | 2017 |
Authenticated storage using small trusted hardware HJ Yang, V Costan, N Zeldovich, S Devadas Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 35-46, 2013 | 25 | 2013 |
Security challenges and opportunities in adaptive and reconfigurable hardware V Costan, S Devadas Hardware-Oriented Security and Trust (HOST), 2011 IEEE International …, 2011 | 9 | 2011 |
Sanctum: Minimal RISC Extensions for Isolated Execution. V Costan, IA Lebedev, S Devadas IACR Cryptology ePrint Archive 2015, 564, 2015 | 6 | 2015 |
A commodity trusted computing module VM Costan Massachusetts Institute of Technology, 2008 | 1 | 2008 |
Sanctum: minimal architectural extensions for isolated execution VM Costan Massachusetts Institute of Technology, 2016 | | 2016 |