Offsite Link

A Practical Library Operating System for Unmodified Applications

This paper disproves assumptions that unmodified applications can cause poor performance and a larger trusted computing base while running on Intel® Software Guard Extensions.
Authored by admin Last updated on 03/27/2019 - 16:09
Offsite Link

Secure Linux* Containers Managed By Docker*

The Secure Linux* Container Environment (SCONE) is a mechanism for Docker* that uses the Intel® Software Guard Extensions trusted execution to protect container processes from outside attacks.
Authored by admin Last updated on 03/28/2019 - 11:24
Offsite Link

Panoply: Low-Trusted Computing Base (TCB) Linux* Applications with Intel® SGX Enclaves (PDF)

In this paper, we present a new system called Panoply which bridges the gap between the Intel® Software Guard Extensions (Intel® SGX)-native abstractions and the standard OS abstractions which feat

Authored by admin Last updated on 04/02/2019 - 11:35
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
Authored by Engblom, Jakob (Intel) Last updated on 08/02/2019 - 15:51