Into the Bytecode cover image

#45 – Quintus Kilbourn on TEEs and Secure Hardware

Into the Bytecode

CHAPTER

Securing Hardware: Challenges and Innovations

This chapter explores the intricacies of hardware security, particularly against side-channel and invasive attacks. It emphasizes the use of physically unclonable functions (PUFs) and trusted execution environments (TEEs) to enhance defense mechanisms while discussing the importance of minimizing trust assumptions. The chapter also addresses the role of supply chain vulnerabilities and the need for rigorous verification protocols to ensure hardware integrity.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner