
Ep 8: Durable Security and Privacy-enhanced Computing with Dr. Todd Austin, University of Michigan
Computer Architecture Podcast
00:00
Using the Elgarithm for High Performance Architecture
There's this fundamental tension between high performance design, optimizing the comic case and sharing resources so you don't need more transitors than you need. When an untrusted and a trusted entity share the same piece of hardware, the untrusted entity can infer information about what the trusted entity is doing. The time dilation will be proportional to the number of ones and zeros within that part of the key. So those interactions are the shearing of the cash and the optimizing of latency. It's one thing we've figured in the last few years, it is really hard to stop those things. You've ben focus on the cash, and people move the b t b, focus on
Play episode from 06:09
Transcript


