Running I/O-intensive, memory-demanding server applications in enclaves leads to significant performance problems. Resolve the issues with exitless system calls and paging in enclaves.
Vulnerabilities allow untrusted operating systems to extract secret information from enclaves by exploiting concurrency bugs. Learn tactics to overcome this issue.
Detect integrity and consistency violations with a lightweight protocol that establishes a collective memory among all remote application clients.
Learn about a time-synchronized, tamper-evident design that tracks medical device and patient information.
Address privacy concerns through a test that circles the entire dictionary through trusted hardware on the cloud server.
Replication protocols based on hybrid fault models can tolerate arbitrary faults and reduce costs. But, they are unprepared for fault models in multicore processors. Learn how Hybster can make a hybrid state-machine replication a better option.
This powerful cryptographic mechanism lets an authorized entity compute on encrypted data and learn from the results. Leverage this resource with Iron, a practical and usable functional encryption system that's built into the software.
Protect an unprivileged program that runs inside a secure enclave from a privileged attacker with full control of the operating system.
Trusted execution support in modern CPUs can protect applications in untrusted environments, resulting with a large trusted computing base (TCB). Explore an approach that results with a smaller TCB.