all InfoSec news
Security Verification of Low-Trust Architectures. (arXiv:2309.00181v1 [cs.AR])
cs.CR updates on arXiv.org arxiv.org
Low-trust architectures work on, from the viewpoint of software,
always-encrypted data, and significantly reduce the amount of hardware trust to
a small software-free enclave component. In this paper, we perform a complete
formal verification of a specific low-trust architecture, the Sequestered
Encryption (SE) architecture, to show that the design is secure against direct
data disclosures and digital side channels for all possible programs. We first
define the security requirements of the ISA of SE low-trust architecture.
Looking upwards, this ISA …
architecture data design enclave encrypted encrypted data encryption free hardware low security software trust verification work