The edge is no longer just a server in a regional facility. Today’s edge is a telco tower on a mountain, a 5G small cell on a light pole, or a drone flying over a farm. These environments are physically hostile. An attacker can simply walk up to a remote radio unit (RRU) or a baseband unit (BBU) and plug in a JTAG debugger.
The tower is untrusted. The cabinet is open. The CPU, however, is a fortress.
Wireless SGX: Securing the Edge of the Unconnected World Subtitle: How Hardware Trust Extends Beyond the Data Center
Enter .
The edge is no longer just a server in a regional facility. Today’s edge is a telco tower on a mountain, a 5G small cell on a light pole, or a drone flying over a farm. These environments are physically hostile. An attacker can simply walk up to a remote radio unit (RRU) or a baseband unit (BBU) and plug in a JTAG debugger.
The tower is untrusted. The cabinet is open. The CPU, however, is a fortress.
Wireless SGX: Securing the Edge of the Unconnected World Subtitle: How Hardware Trust Extends Beyond the Data Center
Enter .