Into the Bytecode cover image

#45 – Quintus Kilbourn on TEEs and Secure Hardware

Into the Bytecode

00:00

Securing Hardware: Challenges and Innovations

This chapter explores the intricacies of hardware security, particularly against side-channel and invasive attacks. It emphasizes the use of physically unclonable functions (PUFs) and trusted execution environments (TEEs) to enhance defense mechanisms while discussing the importance of minimizing trust assumptions. The chapter also addresses the role of supply chain vulnerabilities and the need for rigorous verification protocols to ensure hardware integrity.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app