Offsite Link

Protect Cache-Based Side-Channels Using Hardware Transactional Memory

Address side-channel attacks in multitenant environments, such as cloud data centers.
Criado por administrar Última atualização em 28/03/2019 - 13:40
Offsite Link

Formal Abstractions for Attested Execution in Secure Processors

Realistic secure processors, including for academic and commercial purposes, commonly realize “attested execution” abstractions. Learn about formal abstractions for secure processors and explore their power.
Criado por administrar Última atualização em 27/03/2019 - 15:56
Offsite Link

Towards Safe Enclaves

Protected module architectures, like the recently launched Intel® Software Guard Extensions (Intel® SGX), make it possible to protect individual software modules of an application against attacks f

Criado por administrar Última atualização em 05/02/2019 - 09:43
Offsite Link

Moat: Verifying Confidentiality Properties of Enclave Programs

Security-critical applications constantly face threats from exploits in lower computing layers such as the operating system, virtual machine monitors, or even attacks from malicious administrators.

Criado por administrar Última atualização em 05/02/2019 - 14:46
Offsite Link

A Design and Verification Method for Secure Isolated Regions

Hardware support for isolated execution keeps code and data confidential even on a hostile or compromised host.

Criado por administrar Última atualização em 27/03/2019 - 10:07
Offsite Link

A Minimal Approach to State Continuity

Protected module architectures isolate sensitive parts of an application while it's running.

Criado por administrar Última atualização em 27/03/2019 - 10:14
Offsite Link

Use Transparent Enclaves to Prove and Sell Knowledge

Trusted hardware systems provide confidentiality and integrity for applications but leave them open to side-channel attacks. A Sealed-Glass Proof cryptographic primitive allows safe, verifiable computing in zero knowledge (along with other uses).
Criado por administrar Última atualização em 28/03/2019 - 11:27
Offsite Link

Foundations of Hardware-Based Attested Computation

New capabilities in trusted hardware allow code to run in isolated environments and securely report to remote parties. Learn about three cryptographic tools that are associated with the new generation of trusted hardware solutions.
Criado por administrar Última atualização em 02/04/2019 - 11:06
Offsite Link

A Distributed Sandbox for Untrusted Computation on Secret Data

Users of data processing services (such as tax preparation or genomic screening) are forced to trust those agencies with secret data. Ryoan accomplishes this task through hardware and a request-oriented data model
Criado por administrar Última atualização em 28/03/2019 - 11:21
Offsite Link

Challenges for Developing Secure Enclaves

The combination of different vulnerabilities resulted in developing protected-module architectures with a strong isolation. Learn how to write these modules.
Criado por administrar Última atualização em 27/03/2019 - 15:27