About
News
Blog
Member
Research
Papers
Confs
Access
Light
Dark
Automatic
English
English
日本語
CVM
BadAML: Exploiting Legacy Firmware Interfaces to Compromise Confidential Virtual Machines
Confidential virtual machines (CVMs) are an emerging form of trusted execution environment that enable existing operating systems (OSs) …
Satoru Takekoshi
,
Manami Mori
,
Takaaki Fukai
,
Takahiro Shinagawa
Cite
Slides
DOI
Hardware Authenticator Binding: A Secure Alternative to Passkeys
Fast Identity Online 2 (FIDO2) uses public-key authentication to address the weaknesses of password-based methods. FIDO2 assumes that …
Momoko Shiraishi
,
Takahiro Shinagawa
DOI
Toward Hardware-Assisted Kernel-Bypass Data Movement and Transfer
Modern datacenters spend a significant amount of CPU time on simple but frequent data movement operations such as memory copying, …
Keisuke Iida
,
Takahiro Shinagawa
Poster
Abstract
Cite
×