Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
Cédric Fournet
Author Archives
Toward Confidential Cloud Computing
Extending hardware-enforced cryptographic protection to data while in use.
A Messy State of the Union: Taming the Composite State Machines of TLS
We systematically test popular TLS implementations and find unexpected transitions in many of their state machines that have stayed hidden for years. We show how some of these flaws lead to critical security vulnerabilities.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved