APPLICATIONS OF TECHNOLOGY: Data security and privacy for data containing sensitive information, such as data containing personally-identifying information, proprietary information, and/or other regulated or sensitive data sources: personal health information, such as health records financial information Secure data storage, e.g., cloud service … [Read more...] about Trusted Execution Environments (TEEs) for Higher Security Data Processing with Improved Performance and Usability 2019-034
Cybersecurity
Identifying Computational Operations Based on Power Measurements 2016-053
APPLICATIONS OF TECHNOLOGY: Signals intelligence for computers, including supercomputers Misuse identification of computing systems Relevant to large, power-consuming data centers, i.e., Amazon, Google, IBM, etc. ADVANTAGES: Non-invasive monitoring with low risk of detection ABSTRACT: Berkeley Lab researchers Sean Peisert and Charles McParland have … [Read more...] about Identifying Computational Operations Based on Power Measurements 2016-053