Confidential computing and related technologies: a critical review
Abstract This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also...
Main Authors: | Muhammad Usama Sardar, Christof Fetzer |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2023-05-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | https://doi.org/10.1186/s42400-023-00144-1 |
Similar Items
-
Trusted Execution Environments: Applications and Organizational Challenges
by: Tim Geppert, et al.
Published: (2022-07-01) -
DTA: Run TrustZone TAs Outside the Secure World for Security Testing
by: Juhyun Song, et al.
Published: (2024-01-01) -
Demystifying Attestation in Intel Trust Domain Extensions via Formal Verification
by: Muhammad Usama Sardar, et al.
Published: (2021-01-01) -
Formal Specification and Verification of Architecturally-Defined Attestation Mechanisms in Arm CCA and Intel TDX
by: Muhammad Usama Sardar, et al.
Published: (2024-01-01) -
uTango: An Open-Source TEE for IoT Devices
by: Daniel Oliveira, et al.
Published: (2022-01-01)