Follow
Victor Costan
Victor Costan
MIT CSAIL
Verified email at mit.edu - Homepage
Title
Cited by
Cited by
Year
Intel SGX Explained.
V Costan, S Devadas
IACR Cryptology ePrint Archive 2016, 86, 2016
23492016
Sanctum: Minimal Hardware Extensions for Strong Software Isolation.
V Costan, IA Lebedev, S Devadas
USENIX Security Symposium, 857-874, 2016
7152016
The trusted execution module: Commodity general-purpose trusted computing
V Costan, LFG Sarmenta, M Van Dijk, S Devadas
International Conference on Smart Card Research and Advanced Applications …, 2008
532008
Secure processors part I: Background, taxonomy for secure enclaves and Intel SGX architecture
V Costan, I Lebedev, S Devadas
Foundations and Trends® in Electronic Design Automation 11 (1-2), 1-248, 2017
462017
Secure processors part II: Intel SGX security analysis and MIT sanctum architecture
V Costan, I Lebedev, S Devadas
Foundations and Trends® in Electronic Design Automation 11 (3), 249-361, 2017
442017
Authenticated storage using small trusted hardware
HJ Yang, V Costan, N Zeldovich, S Devadas
Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 35-46, 2013
222013
Security challenges and opportunities in adaptive and reconfigurable hardware
V Costan, S Devadas
Hardware-Oriented Security and Trust (HOST), 2011 IEEE International …, 2011
92011
Sanctum: Minimal RISC Extensions for Isolated Execution.
V Costan, IA Lebedev, S Devadas
IACR Cryptology ePrint Archive 2015, 564, 2015
62015
A commodity trusted computing module
VM Costan
Massachusetts Institute of Technology, 2008
12008
Sanctum: minimal architectural extensions for isolated execution
VM Costan
Massachusetts Institute of Technology, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–10