The SECONDI MAPZ© system: a practical guide and proof of concept

2016 ◽  
Vol 54 (4) ◽  
pp. 430-437
Author(s):  
Muammar Abu-Serriah ◽  
Lilia Wong ◽  
Jeremy Richardson ◽  
Sophia Richardson
2014 ◽  
Vol 52 (8) ◽  
pp. e92-e93
Author(s):  
Sophia Richardson ◽  
Lilia Wong ◽  
Jeremy Richardson ◽  
Muammar Abu-Serriah
Keyword(s):  

2018 ◽  
Vol 45 (11) ◽  
pp. 5305-5316 ◽  
Author(s):  
Ludovic De Marzi ◽  
Annalisa Patriarca ◽  
Catherine Nauraye ◽  
Eric Hierso ◽  
Rémi Dendale ◽  
...  

Author(s):  
Bruno Meneguele ◽  
Keiko Fonseca ◽  
Marcelo Rosa

Intel SGX is not accessible from the most privileged execution level, known as ring zero, where the operating system kernel is placed. However, it is possible to split the execution responsibility between kernel and userspace by creating a dependency among these two levels that allow internal kernel data to be stored or processed within SGX private enclaves. In this paper we present SKEEN, an enhanced way to isolate internal operating system components and structures with Intel SGX technology, preventing information leak to different components of the same operating system. A proof-of-concept is provided to exemplify its usage.


Sign in / Sign up

Export Citation Format

Share Document