Offsite Link

A Practical Library Operating System for Unmodified Applications

This paper disproves assumptions that unmodified applications can cause poor performance and a larger trusted computing base while running on Intel® Software Guard Extensions.
Autor admin Última actualización 27/03/2019 - 16:09
Offsite Link

Secure Linux* Containers Managed By Docker*

The Secure Linux* Container Environment (SCONE) is a mechanism for Docker* that uses the Intel® Software Guard Extensions trusted execution to protect container processes from outside attacks.
Autor admin Última actualización 28/03/2019 - 11:24
Offsite Link

Panoply: Low-Trusted Computing Base (TCB) Linux* Applications with Intel® SGX Enclaves (PDF)

In this paper, we present a new system called Panoply which bridges the gap between the Intel® Software Guard Extensions (Intel® SGX)-native abstractions and the standard OS abstractions which feat

Autor admin Última actualización 02/04/2019 - 11:35
Article

Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms

Intel’s Excite project uses a combination of symbolic execution, fuzzing, and concrete testing to find vulnerabilities in sensitive code.
Autor Engblom, Jakob (Intel) Última actualización 02/08/2019 - 15:51