YoVDO

Mind the Gap - Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Embedded Systems Courses Case Study Analysis Courses Security Vulnerabilities Courses Trusted Execution Environment Courses

Course Description

Overview

Explore the security vulnerabilities in embedded Trusted Execution Architectures (TEAs) through this 18-minute IEEE conference talk. Delve into the research conducted by Marton Bognar, Jo Van Bulck, and Frank Piessens from KU Leuven as they examine the gaps between theoretical security proofs and practical implementations of TEAs. Gain insights into potential weaknesses in systems that are considered provably secure, and understand the importance of bridging the divide between formal verification and real-world security challenges in embedded systems.

Syllabus

Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

IoT Product Security
Cybrary
Trusted Execution Environments Meet the Blockchain
Simons Institute via YouTube
Cache Side Channel Attack - Exploitability and Countermeasures
Black Hat via YouTube
Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube