The first formal verification of a prototype of Arm CCA firmware


Protecting sensitive information has become a crucial component of computing infrastructures as our personal data is used in more and more applications, including advertising, finance, and healthcare.

Applications that process such data must have confidence in the system software, like as operating systems and hypervisors, on which they rely. However, this system software is sophisticated and frequently has flaws that put the confidentiality and integrity of the data at danger. Read More…