Skip to main content

Showing 1–3 of 3 results for author: Dutly, N

.
  1. arXiv:2410.13489  [pdf, other

    cs.CR

    Breaking Bad: How Compilers Break Constant-Time~Implementations

    Authors: Moritz Schneider, Daniele Lain, Ivan Puddu, Nicolas Dutly, Srdjan Capkun

    Abstract: The implementations of most hardened cryptographic libraries use defensive programming techniques for side-channel resistance. These techniques are usually specified as guidelines to developers on specific code patterns to use or avoid. Examples include performing arithmetic operations to choose between two variables instead of executing a secret-dependent branch. However, such techniques are only… ▽ More

    Submitted 17 October, 2024; originally announced October 2024.

  2. arXiv:2408.05835  [pdf, other

    cs.CR

    Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation

    Authors: Andrin Bertschi, Supraja Sridhara, Friederike Groschupp, Mark Kuhne, Benedict Schlüter, Clément Thorens, Nicolas Dutly, Srdjan Capkun, Shweta Shinde

    Abstract: Arm Confidential Computing Architecture (CCA) executes sensitive computation in an abstraction called realm VMs and protects it from the hypervisor, host OS, and other co-resident VMs. However, CCA does not allow integrated devices on the platform to access realm VMs and doing so requires intrusive changes to software and is simply not possible to achieve securely for some devices. In this paper,… ▽ More

    Submitted 11 August, 2024; originally announced August 2024.

  3. arXiv:2407.16694  [pdf, other

    cs.CR

    Aster: Fixing the Android TEE Ecosystem with Arm CCA

    Authors: Mark Kuhne, Supraja Sridhara, Andrin Bertschi, Nicolas Dutly, Srdjan Capkun, Shweta Shinde

    Abstract: The Android ecosystem relies on either TrustZone (e.g., OP-TEE, QTEE, Trusty) or trusted hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and Android bugs. TrustZone allows any secure world code to access the normal world that runs Android. Similarly, a trusted hypervisor has full access to Android running in one VM and security services in other VMs. In this p… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.