transformation
Hardware, Languages, and Architectures for Defense Against Hostile Operating Systems (DHOSA) Vikram Adve, Krste Asanović, David Evans, Sam King, Greg Morrisett,
Secure Virtual Architecture
Formal Methods for Minimizing the DHOSA Trusted Computing Base
Practical Cryptographic Secure Computation
Data-Centric Security
Hardware, Languages, and Architectures for Defense Against Hostile Operating Systems (DHOSA)
Hardware Support for Isolation