About 30 results
Open links in new tab
  1. In this paper, we present DORAMI—a privilege separation approach that isolates the SM from the firmware thus reducing the attack surface on TEEs. DORAMI re-purposes existing ISA features to …

  2. DORAMI has to route the request to the correct compartment. For ex-ample DORAMI has to invoke the Firmware compartment if the S/U-mode wants to invoke firmware functions

  3. en-dor code specific to the platform. In this paper, we present DORAMI—a privilege separation approach that isolates the SM from the firmware thu. reducing the attack surface on TEEs. DORAMI …

  4. Dorami: A Privilege Separation Approach for Secure Monitors on RISC-V TEEs, by Nivedita Singh and Nipun Gupta, arXiv, 2024.

  5. 3.11. DORAMI cution modes (P, F, S/U). This design minimizes the need for significant hardware changes, facilitating easier ado tion in existing systems. However, the architecture’s effectiveness is …

  6. Dorami [61] is a recent RISC-V security monitor that iso-lates firmware in an M-mode compartment. However, it re-quires binary scanning and vendor firmware modification for each platform and thus …

  7. For example, Kuhne et al. [15] proposed Dorami to isolate untrusted vendor firmware from system monitors. Keystone [16] re-purposes PMP as a security primitive to support Trusted Execution …