About: The first book focusing specifically on design of secure processor architectures, including topics such as Trusted Execution Environments and Side-Channel Threats and Protections.
Abstract: With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book gives readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered).
Free Sample Chapters: Free copy of the frontmatter and the first two chapters is available here.PDF for Institutions with Subscription to Synthesis Lectures on Computer Architecture: Many students can access PDF of the whole book via their institution's subscription to Morgan & Claypool books. PDF can be downloaded from https://www.morganclaypool.com/toc/cac/1/1.
Tutorials on Secure Processor Architectures: This book is complemented by number of tutorials which can be found on my page here. The tutorials come with free PDFs of the slides.