Trusted Computing

Trusted Computing is a security approach that uses special hardware features to make sure computers run software as expected and protect sensitive data. One key technology in this field is Trusted Execution Environments (TEEs), which create isolated execution environments inside a processor where sensitive operations can be executed safely, even if the rest of the system is compromised. We are interested in all aspects of Trusted Computing: from discovering new attacks on modern processors, analyzing side-channels of security-critical software, to designing better TEEs.

Active Members

Talks

RA-WEBs: Remote Attestation for WEB services

Selected Publications

IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES 2026)
Outstanding Cybersecurity Contribution Award at 5th anniversary of Cyber-Defence Campus