Trusted Hardware
Can we Hide Atoms?
(Or Electrons, or Subatomic Particles)
Trusted HW or Manufacturer?
Source: Costan & Devadas. Intel sgx explained.
Let’s consider MEV-SGX
Open questions (https://ethresear.ch/t/mev-sgx-a-sealed-bid-mev-auction-design/9677)
MEV-SGX problem
Searchers cannot tell if miners have broken into their sgx
Threat Model
in Intel SGX
Refs: Intel SGX Explained, Star Wars Rogue One
Refs: [Chip Red Pill, OPERA]
RISC-V to the rescue?
Chip Attacks
Can we trust a chip manufacturer?
DAMO
Decentralized Autonomous Manufacturing Organization
References
Towards DAMO
An Exploration of Open Hardware
Resources
A Trustworthy, Free (Libre), Linux Capable, Self-Hosting 64bit RISC-V Computer
TEE Hardware for RISC V
MiG-V: logic-encrypted processor
“Logic encryption hinders the insertion of hardware Trojans, giving HENSOLDT Cyber the full control of the design and production chain.” -- https://hensoldt-cyber.com/mig-v/