Writing real-world programs that operate securely on untrusted hardware
Develop techniques to design and implement real-world programs that can operate correctly and securely on untrusted hardware, mitigating the security consequences of intermittent and probabilistic hardware misbehavior under current architectures.
References
We do not know how to write real-world programs that can operate on untrusted hardware. Any tiny, innocent-looking, intermittent and probabilistic misbehavior can, under current architectures, have disastrous security implications.
— Fundamental Challenges in Cybersecurity and a Philosophy of Vulnerability-Guided Hardening
(2402.01944 - Böhme, 2 Feb 2024) in Section 2.3.2 Abstraction