Trusted execution environments, and particularly the Software Guard eXtensions (SGX) included in recent Intel x86 processors, gained significant traction in recent years. A long track of research papers, and increasingly also realworld industry applications, take advantage of the strong hardware-enforced confidentiality and integrity guarantees provided by Intel SGX. Ultimately, enclaved execution holds the compelling potential of securely offloading sensitive computations to untrusted remote platforms. We present Foreshadow, a practical software-only microarchitectural attack that decisively dismantles the security objectives of current SGX implementations. Crucially, unlike previous SGX attacks, we do not make any assumptions on the vict...
Software Guard Extension (SGX) is a hardware-based trusted execution environment (TEE) implemented i...
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
The inclusion of the Software Guard eXtensions (SGX) in recent Intel processors has been broadly acc...
© Springer International Publishing AG, part of Springer Nature 2018. Enclaved execution environment...
In January 2018, we discovered the Foreshadow transient execution attack (USENIX Security’18) target...
Intel SGX is the latest processor architecture promising secure code execution despite large, comple...
© 2019 IEEE. Foreshadow is a speculative execution attack that allows adversaries to subvert the sec...
International audienceIn modern computer systems, user processes are isolated from each other by the...
© 2017 ACM. Protected module architectures such as Intel SGX hold the promise of protecting sensitiv...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...
Intel’s Software Guard Extensions (SGX) provide a new hardware-based trusted execution environment o...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
Recent transient execution attacks have demonstrated that attackers may leak sensitive information a...
Software Guard Extension (SGX) is a hardware-based trusted execution environment (TEE) implemented i...
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
The inclusion of the Software Guard eXtensions (SGX) in recent Intel processors has been broadly acc...
© Springer International Publishing AG, part of Springer Nature 2018. Enclaved execution environment...
In January 2018, we discovered the Foreshadow transient execution attack (USENIX Security’18) target...
Intel SGX is the latest processor architecture promising secure code execution despite large, comple...
© 2019 IEEE. Foreshadow is a speculative execution attack that allows adversaries to subvert the sec...
International audienceIn modern computer systems, user processes are isolated from each other by the...
© 2017 ACM. Protected module architectures such as Intel SGX hold the promise of protecting sensitiv...
Recent research has demonstrated that Intel's SGX is vulnerable to various software-based side-chann...
Intel’s Software Guard Extensions (SGX) provide a new hardware-based trusted execution environment o...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
Recent transient execution attacks have demonstrated that attackers may leak sensitive information a...
Software Guard Extension (SGX) is a hardware-based trusted execution environment (TEE) implemented i...
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
© 2018 Copyright held by the owner/author(s). Recent research on transient execution vulnerabilities...