This paper discusses how Intel® Tamper Protection Toolkit helps protect critical code and valuable data against reverse-engineering and tampering attacks. It describes all components of the Intel Tamper Protection Toolkit and explains how to refactor relevant code and apply tamper protection to the Scrypt utility.
Enclaves are isolated memory regions of code and data that are highly secure. Application code can be put into an enclave via special instructions and software via the Intel® SGX SDK. SGX Enclaves are hardened by CPU-based security mechanisms and can be remotely provisioned and attested.
With partners ElectriCChain, SolarCoin,
There are 18 types of instructions and 13 types of data structures available in Intel® SGX. Get a quick overview of this foundation architecture of the platform.
In part 3 of this series, you'll learn how to design an application to take advantage of Intel® Software Guard Extensions (Intel® SGX). You'll examine the overall structure of an application, and then create a class model that prepares the app for enclave design and integration. Source code is included.
Para obtener información más completa sobre las optimizaciones del compilador, consulte nuestro Aviso de optimización.