Computer Security
Last updated
Was this helpful?
Last updated
Was this helpful?
- Audits x86 processors for hidden instructions and hardware bugs, by systematically generating machine code to search through a processor's instruction set, and monitoring execution for anomalies.
- CacheOut, a new speculative execution attack that is capable of leaking data from Intel CPUs across many security boundaries.
- Walkthrough of an interesting way to break the boot flow
- An Open Framework for Architecting Trusted Execution Environments
- A set of instructions that increases the security of application code and data, giving them more protection from disclosure or modification
- A curated list of cryptography resources and links.