Offsite Link

Manage Sensitive Data with SecureKeeper

Cloud computing has trust issues for applications that manage sensitive data. Learn how to use an enhanced version of Apache ZooKeeper* to shield them from untrusted software.
Authored by admin Last updated on 03/27/2019 - 15:38
Offsite Link

Protect Password Databases Using Trusted Hardware

A human-chosen password is relatively easy to guess and is frequently reused. Increase security by generating a random salt value for each user, and then concatenate it with the password before hashing.
Authored by admin Last updated on 03/28/2019 - 10:10
Offsite Link

Mitigate Password Database Breaches

It is now more feasible to attack hardware by guessing the passwords (even when they are made more secure). Provide stronger protection by adding keys to passwords before they are hashed.
Authored by admin Last updated on 03/27/2019 - 16:39
Offsite Link

A Case for Protecting Computer Games

Intel® Software Guard Extensions provides new security guarantees that prevent players from cheating and getting unlicensed copies. 

Authored by admin Last updated on 03/26/2019 - 21:40
Offsite Link

Isolate Operating System Components

Intel® Software Guard Extensions was not designed to work in kernel mode. But, Linux* kernel functionality can be wrapped within its enclaves by moving parts to a user space.
Authored by admin Last updated on 03/27/2019 - 16:32
Offsite Link

Achieve Improved Performance with Exitless Services

Running I/O-intensive, memory-demanding server applications in enclaves leads to significant performance problems. Resolve the issues with exitless system calls and paging in enclaves.
Authored by admin Last updated on 03/27/2019 - 15:41
Offsite Link

Run a Trusted Client-Side JavaScript*

JavaScript* improves the user experience and reduces the server load for web applications but has unreliable confidentiality and integrity. To resolve this issue, use TrustJS to partition the code.
Authored by admin Last updated on 03/28/2019 - 13:58
Offsite Link

Avoid Leaks & Synchronization Attacks with Enclave-Side Preemption Control

Vulnerabilities allow untrusted operating systems to extract secret information from enclaves by exploiting concurrency bugs. Learn tactics to overcome this issue.
Authored by admin Last updated on 04/02/2019 - 15:59
Offsite Link

Use Lightweight Collective Memory to Detect Rollback and Forking Attacks

Detect integrity and consistency violations with a lightweight protocol that establishes a collective memory among all remote application clients.
Authored by admin Last updated on 03/28/2019 - 10:16
Offsite Link

A Cloud-Based, Secure Logger for Medical Use

Learn about a time-synchronized, tamper-evident design that tracks medical device and patient information.
Authored by admin Last updated on 03/27/2019 - 12:34