© 2017 ACM. Today's technologies such as Intel SGX enable developers to protect applications from more privileged security layers. Applications can be developed with significantly smaller TCBs than before. Two main techniques have emerged to harden applications for these newsecurity architectures. One focuses on partitioning applications in pieces-of-Applicationlogic thereby isolating security-sensitive parts in their own enclaves. The other moves full unmodified applications to a single enclave tied together with a library OS. In this paper we argue that both techniques should be treated as separate security mechanisms each providing their own balance in terms of security, performance and usability.status: publishe
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
© 2019 Association for Computing Machinery. More and more off-the-shelf processors support the dynam...
Application size and complexity are the underlying cause of numerous security vulnerabilities in cod...
Trusted execution support in modern CPUs, as offered by Intel SGX enclaves , can protect application...
The size and complexity of modern applications are the underlying causes of numerous security vulner...
The combination of (1) hard to eradicate low-level vulnerabilities, (2) a large trusted computing ba...
Intel Software Guard Extensions (SGX) is a recent technology from Intel that makes it possible to ex...
Intel announced in September 2013 SGX (Software Guard eXtension) technology to be implemented in the...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
Process-based confidential computing enclaves such as Intel SGX can be used to protect the confident...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Shielded execution based on Intel SGX provides strong security guarantees for legacy applications ru...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
© 2019 Association for Computing Machinery. More and more off-the-shelf processors support the dynam...
Application size and complexity are the underlying cause of numerous security vulnerabilities in cod...
Trusted execution support in modern CPUs, as offered by Intel SGX enclaves , can protect application...
The size and complexity of modern applications are the underlying causes of numerous security vulner...
The combination of (1) hard to eradicate low-level vulnerabilities, (2) a large trusted computing ba...
Intel Software Guard Extensions (SGX) is a recent technology from Intel that makes it possible to ex...
Intel announced in September 2013 SGX (Software Guard eXtension) technology to be implemented in the...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
Process-based confidential computing enclaves such as Intel SGX can be used to protect the confident...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Shielded execution based on Intel SGX provides strong security guarantees for legacy applications ru...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
© 2019 Association for Computing Machinery. More and more off-the-shelf processors support the dynam...