
#45 – Quintus Kilbourn on TEEs and Secure Hardware
Into the Bytecode
Securing Hardware: Challenges and Innovations
This chapter explores the intricacies of hardware security, particularly against side-channel and invasive attacks. It emphasizes the use of physically unclonable functions (PUFs) and trusted execution environments (TEEs) to enhance defense mechanisms while discussing the importance of minimizing trust assumptions. The chapter also addresses the role of supply chain vulnerabilities and the need for rigorous verification protocols to ensure hardware integrity.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.