MI6 is an aggressive, speculative out-of-order processor to support Secure Enclaves, which restore the process isolation guarantees broken by recent attacks exploiting microarchitectural sidechannels.Our threat model includes an untrusted OS and an attacker capable of mounting any software attack currently considered practical, including control flow speculation attacks such as Spectre. We model the performance impact of the hardware and software mechanisms added to support enclaves in MI6 through FPGA emulation on AWS F1 FPGAs by running SPEC CINT2006 benchmarks on top of an untrusted Linux OS. Security comes at the cost of 16.7% average slowdown for protected programs (MICRO 2019). Our open-source implementation will be auditable ...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
Recent attacks have broken process isolation by exploiting microarchitectural side channels that all...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...
The inclusion of the Software Guard eXtensions (SGX) in recent Intel processors has been broadly acc...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The emergence of the open-source RISC-V ISA empowers developers and engineers, device manufactures, ...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
Recent attacks have broken process isolation by exploiting microarchitectural side channels that all...
In the last decade, security architectures became prominent which protect sensitive data in isolated...
The pursuit of secure computation has always featured a tension between performance and security. Se...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...
The inclusion of the Software Guard eXtensions (SGX) in recent Intel processors has been broadly acc...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
The emergence of the open-source RISC-V ISA empowers developers and engineers, device manufactures, ...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...