The first formal verification of a prototype Arm CCA firmware
As our personal data is increasingly used in many applications, from advertising to finance to healthcare, protecting sensitive information has become an essential feature of computing architectures. Applications that process such data must trust the system software they trust, such as operating systems and hypervisors, but such system software is complex and often has vulnerabilities … Read more