Modern processors include high-performance cryptographic functionalities...
We present Blinded Memory (BliMe), a way to realize efficient and secure...
Autonomous collaborative networks of devices are emerging in numerous
do...
Consensus mechanisms used by popular distributed ledgers are highly scal...
A popular run-time attack technique is to compromise the control-flow
in...