Methods, apparatus and machine-readable medium are described that attempt
to protect secrets from sleep attacks. In some embodiments, the secrets
are encrypted and a security enhanced environment dismantled prior to
entering a sleep state. Some embodiments further re-establish a security
enhanced environment and decrypt the secrets in response to a wake event.