Yipan Deng

Learn More
In this work, we describe an effective device-based isolation approach for achieving data security. Device-based isolation leverages the proliferation of personal computing devices to provide strong run-time guarantees for the confidentiality of secrets. To demonstrate our isolation approach, we show its use in protecting the secrecy of highly sensitive(More)
  • 1