This paper discusses how Intel® Tamper Protection Toolkit helps protect critical code and valuable data against reverse-engineering and tampering attacks. It describes all components of the Intel Tamper Protection Toolkit and explains how to refactor relevant code and apply tamper protection to the Scrypt utility.
With partners ElectriCChain, SolarCoin,
In part 3 of this series, you'll learn how to design an application to take advantage of Intel® Software Guard Extensions (Intel® SGX). You'll examine the overall structure of an application, and then create a class model that prepares the app for enclave design and integration. Source code is included.
Intel® SGX Code Sample: Learn how to mix enclaves with managed code on Microsoft Windows* platforms using the C# language. There are multiple solutions for accomplishing these tasks, and this article and its accompanying code sample demonstrate one approach.
Learn how to enhance security for software on Windows® 10 using Intel® Memory Protection Extensions.
In part 4 of this tutorial series, you'll create the project infrastructure necessary to integrate the enclave into your application. Source code is included.
For more complete information about compiler optimizations, see our Optimization Notice.