Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.Cataloged from PDF version of thesis.Includes bibliographical references (pages 319-334).Intel's Software Guard Extensions (SGX) have captured the attention of security practitioners by promising to secure computation performed on a remote computer where all the privileged software is potentially malicious. Unfortunately, an independent analysis of SGX reveals that it is vulnerable to software attacks, and it can only be used by developers licensed by Intel. Furthermore, significant parts of SGX are undocumented, making it impossible for researchers outside of Intel to reason about some of its security properties. Sanctum o...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable i...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
We consider the problem of how to provide an execution environment where the application's secrets a...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
We explore how many-core platforms can be used to enhance the security of future systems and to supp...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
International audienceIn modern computer systems, user processes are isolated from each other by the...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable i...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
We consider the problem of how to provide an execution environment where the application's secrets a...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
We explore how many-core platforms can be used to enhance the security of future systems and to supp...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
International audienceIn modern computer systems, user processes are isolated from each other by the...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...