Let's stop trusting software with our sensitive data

Christopher Fletcher, Marten Van Dijk, Srinivas Devadas

Research output: Contribution to journalArticlepeer-review

Abstract

Software that operates on our data is assumed to be curious or malicious. To make matters worse, the cloud service provider can also be malicious and can run whatever program it wants on our data. Therefore, to be secure no private data can be allowed outside the processor without being encrypted first; and the processor must be architected in such a way that from the view of an external observer (humans, equipment, or software), the processor does not divulge anything about the private data that lies within. The Ascend processor attempts to achieve these goals; the only entity that the client has to trust is the processor itself.

Original languageEnglish (US)
Article number6523988
Pages (from-to)103-104
Number of pages2
JournalIEEE Design and Test
Volume30
Issue number2
DOIs
StatePublished - Jan 1 2013
Externally publishedYes

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Cite this