A Toolkit for Micro-architectural Attacks on Mobile Devices (available)

Micro-architectural attacks leverage side-effects from modern processor features during the execution of secret-dependent code. These attacks have emerged in recent years as a potent vector for recovering cryptographic keys and other secret data. Despite this, very few implementations of published attacks have been released publicly on mobile devices, which has raised questions about their reproduciblity. … full description “A Toolkit for Micro-architectural Attacks on Mobile Devices (available)”

Combatting Fake News Using Mobile Trusted Execution Environments (available)

The distribution of fake news – hoaxes, propaganda, and outright false articles – by pseudo-news outlets is a major issue. Fake news can undermine trust in legitimate sources of news and the integrity of the democratic process. Existing methods to combat this issue have significant shortcomings. Manual take-downs are slow and lack scalability, particularly if … full description “Combatting Fake News Using Mobile Trusted Execution Environments (available)”