Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy 2013
DOI: 10.1145/2487726.2488368
|View full text |Cite
|
Sign up to set email alerts
|

Innovative instructions and software model for isolated execution

Abstract: For years the PC community has struggled to provide secure solutions on open platforms. Intel has developed innovative new technology to enable SW developers to develop and deploy secure applications on open platforms. The technology enables applications to execute with confidentiality and integrity in the native OS environment. It does this by providing ISA extensions for generating hardware enforceable containers at a granularity determined by the developer. These containers while opaque to the operating sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
594
0
5

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 859 publications
(621 citation statements)
references
References 7 publications
1
594
0
5
Order By: Relevance
“…CRAs, including both return-oriented [57] and jump-oriented [11] variations remain open vulnerabilities and active research topics, despite some promising solutions [48,70,36,37]. An orthogonal line of research pursues protection of application secrets even in the presence of compromised system software layers and malware [23,25,42].…”
Section: Related Workmentioning
confidence: 99%
“…CRAs, including both return-oriented [57] and jump-oriented [11] variations remain open vulnerabilities and active research topics, despite some promising solutions [48,70,36,37]. An orthogonal line of research pursues protection of application secrets even in the presence of compromised system software layers and malware [23,25,42].…”
Section: Related Workmentioning
confidence: 99%
“…Durante a inicialização, umá area contígua de memória, denominada Processor Reserved Memory (PRM),é reservada para prover todas as funcionalidades e restrições ao sistema de enclaves [4] [5]. A PRM possui garantia de segurança contra qualquer tipo de acesso, seja este do Sistema Operacional (SO) ou do Hypervisor.…”
Section: Intel Software Guard Extensionsunclassified
“…A PRM possui garantia de segurança contra qualquer tipo de acesso, seja este do Sistema Operacional (SO) ou do Hypervisor. A criação de um enclave parte da execução pelo SO da instrução ECREATE [4], que tem como primeira ação reservar uma página na Enclave Page Cache (EPC), estrutura utilizada para alocação de memória para o enclave e demais informações de controle. A EPC, internaà PRM,é dividida em páginas para viabilizar múltiplos enclaves.…”
Section: Intel Software Guard Extensionsunclassified
“…An interesting direction recently taken by Intel is developing a mutual distrust model for hardware memory protection, called Software Guard Extensions (SGX) [21,50,70]. SGX allows an OS or hypervisor to manage virtual-to-physical OS mappings for an application, but the lower-level software cannot access memory contents.…”
Section: B Hardware Support For Securitymentioning
confidence: 99%