Cloud computing has trust issues for applications that manage sensitive data. Learn how to use an enhanced version of Apache ZooKeeper* to shield them from untrusted software.
A human-chosen password is relatively easy to guess and is frequently reused. Increase security by generating a random salt value for each user, and then concatenate it with the password before hashing.
It is now more feasible to attack hardware by guessing the passwords (even when they are made more secure). Provide stronger protection by adding keys to passwords before they are hashed.
Intel® Software Guard Extensions provides new security guarantees that prevent players from cheating and getting unlicensed copies.
Intel® Software Guard Extensions was not designed to work in kernel mode. But, Linux* kernel functionality can be wrapped within its enclaves by moving parts to a user space.
Running I/O-intensive, memory-demanding server applications in enclaves leads to significant performance problems. Resolve the issues with exitless system calls and paging in enclaves.
Vulnerabilities allow untrusted operating systems to extract secret information from enclaves by exploiting concurrency bugs. Learn tactics to overcome this issue.
Detect integrity and consistency violations with a lightweight protocol that establishes a collective memory among all remote application clients.
Learn about a time-synchronized, tamper-evident design that tracks medical device and patient information.