Secure Processors Part II

Secure Processors Part II
Author :
Publisher :
Total Pages : 128
Release :
ISBN-10 : 1680833022
ISBN-13 : 9781680833027
Rating : 4/5 (22 Downloads)

Book Synopsis Secure Processors Part II by : Victor Costan

Download or read book Secure Processors Part II written by Victor Costan and published by . This book was released on 2017-07-13 with total page 128 pages. Available in PDF, EPUB and Kindle. Book excerpt: This manuscript is the second in a two part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The first part established the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves). This second part extends Part I's description of Intel's Software Guard Extensions (SGX), an available and documented enclave-capable system, with a rigorous security analysis of SGX as a system for trusted remote computation. This part documents the authors' concerns over the shortcomings of SGX as a secure system and introduces the MIT Sanctum processor developed by the authors: a system designed to offer stronger security guarantees, lend itself better to analysis and formal verification, and offer a more straightforward and complete threat model than the Intel system, all with an equivalent programming model. This two part work advocates a principled, transparent, and wellscrutinized approach to system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead.


Secure Processors Part II Related Books

Secure Processors Part II
Language: en
Pages: 128
Authors: Victor Costan
Categories: Technology & Engineering
Type: BOOK - Published: 2017-07-13 - Publisher:

DOWNLOAD EBOOK

This manuscript is the second in a two part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software at
Principles of Secure Processor Architecture Design
Language: en
Pages: 154
Authors: Jakub Szefer
Categories: Technology & Engineering
Type: BOOK - Published: 2022-06-01 - Publisher: Springer Nature

DOWNLOAD EBOOK

With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security feature
Transactions on Computational Science X
Language: en
Pages: 381
Authors: Marina L. Gavrilova
Categories: Computers
Type: BOOK - Published: 2010-12-07 - Publisher: Springer

DOWNLOAD EBOOK

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere an
Advances in Cryptology – EUROCRYPT 2017
Language: en
Pages: 713
Authors: Jean-Sébastien Coron
Categories: Computers
Type: BOOK - Published: 2017-04-10 - Publisher: Springer

DOWNLOAD EBOOK

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Appli
Advances in Cryptology -- ASIACRYPT 2015
Language: en
Pages: 816
Authors: Tetsu Iwata
Categories: Computers
Type: BOOK - Published: 2015-11-26 - Publisher: Springer

DOWNLOAD EBOOK

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and