I am happy to announce that my first paper has been accepted at USENIX Security!
We propose TEEcorrelate, a mitigation that statistically decorrelates reported performance counters from real ones during TEE execution.
@tom-crypt.bsky.social
π Professor of IT Security @ University of Luebeck π‘ Research in systems security, applied cryptography, and side channels π More info: its.uni-luebeck.de
I am happy to announce that my first paper has been accepted at USENIX Security!
We propose TEEcorrelate, a mitigation that statistically decorrelates reported performance counters from real ones during TEE execution.
#BadRAM just went public: Tampering with DRAM modules allows attackers to bypass SEV-SNP's write protection and forging attestation reports, breaking all trust in #SEV-SNP.
Joint work with Jesse De Meulemeester, Luca Wilke, @sublevado.bsky.social, Ingrid Verbauwhede and Jo Van Bulck
badram.eu