Abstract is missing.
- TEEMo: trusted peripheral monitoring for optical networks and beyondMarcel Busch, Ralph Schlenk, Hans Heckel. [doi]
- Toward scaling hardware security module for emerging cloud servicesJuhyeng Han, Seong-Min Kim, Taesoo Kim, Dongsu Han. [doi]
- Execution integrity without implicit trust of system softwareAhmed Awad, Brad Karp. [doi]
- Protecting the stack with PACed canariesHans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, N. Asokan. [doi]
- Towards a standards-compliant pure-software trusted execution environment for resource-constrained embedded devicesHassaan Janjua, Mahmoud Ammar, Bruno Crispo, Danny Hughes 0001. [doi]
- A vision for autonomous blockchains backed by secure hardwareKai Mast, Lequn Chen, Emin Gün Sirer. [doi]
- Propagating trusted execution through mutual attestationFurkan Turan, Ingrid Verbauwhede. [doi]