Фильтры

Блоги

Intel® Software Guard Extensions SDK for Linux* Availability Update

Whenever I talk with developers about Intel® SGX, one of the first questions asked is ‘When will Linux support be available’?  In the spirit of being open

Автор: Dan Zimmerman (Intel) Последнее обновление: 29.04.2019 - 11:58
Блоги

Question: Does Software Actually Use New Instruction Sets?

Автор: Engblom, Jakob (Intel) Последнее обновление: 04.07.2019 - 16:56
Offsite Link

A Practical Library Operating System for Unmodified Applications

This paper disproves assumptions that unmodified applications can cause poor performance and a larger trusted computing base while running on Intel® Software Guard Extensions.
Автор: админ Последнее обновление: 27.03.2019 - 16:09
Offsite Link

Secure Linux* Containers Managed By Docker*

The Secure Linux* Container Environment (SCONE) is a mechanism for Docker* that uses the Intel® Software Guard Extensions trusted execution to protect container processes from outside attacks.
Автор: админ Последнее обновление: 28.03.2019 - 11:24
Offsite Link

Panoply: Low-Trusted Computing Base (TCB) Linux* Applications with Intel® SGX Enclaves (PDF)

In this paper, we present a new system called Panoply which bridges the gap between the Intel® Software Guard Extensions (Intel® SGX)-native abstractions and the standard OS abstractions which feat

Автор: админ Последнее обновление: 02.04.2019 - 11:35
Offsite Link

Panoply: Low-TCB Linux* Applications with Intel® SGX Enclaves (Project Site)

We present a new system called Panoply which bridges the gap between the Intel® Software Guard Extensions (Intel® SGX)-native abstractions and the standard OS abstractions which feature-rich, commo

Автор: админ Последнее обновление: 01.02.2019 - 08:51
Offsite Link

Graphene Library OS for Intel® SGX

Porting applications to the Intel® Software Guard Extensions (Intel® SGX) platform can be cumbersome.

Автор: админ Последнее обновление: 05.02.2019 - 15:11
Offsite Link

How to Secure System Logs

System logs are the greatest forensics assets that capture how an operating system or a program behaves.

Автор: админ Последнее обновление: 01.02.2019 - 10:48
Offsite Link

A Study of Robust Synchronous Peer-to-Peer Primitives That Use Enclaves

BitTorrent* and Bitcoin* are susceptible to attacks from byzantine nodes that join as peers. Learn how to protect them with a synchronous network where peer nodes have CPUs equipped with Intel® Software Guard Extensions.
Автор: админ Последнее обновление: 28.03.2019 - 10:14