Главная
Study mode:
on
1
Intro
2
Welcome
3
Introduction
4
Legal Disclaimer
5
Private Disclaimer
6
Intel STX
7
What is SGX
8
Requirements
9
Demos
10
Helper Functions
11
EDL Files
12
Enclave vs Application
13
File System Memory
14
Martha
15
Linux
16
System Call
17
Shell Code
18
Marshaling
19
Proxy
20
Ransomware
21
Feasibility
22
STrace
23
STrace Output
24
System Calls
25
Summary
Description:
Explore the intricacies of Intel SGX (Software Guard Extensions) in this conference talk from TROOPERS18. Delve into the requirements, demonstrations, and key components of SGX, including enclaves, applications, and file system memory. Learn about helper functions, EDL files, and the differences between enclave and application environments. Examine practical examples such as the Martha Linux system, shell code, marshaling, and proxy mechanisms. Investigate the feasibility of ransomware in SGX contexts and analyze system calls through strace outputs. Gain valuable insights into the potential security implications and practical applications of Intel SGX technology.

The Wolf in SGX Clothing

WEareTROOPERS
Add to list
0:00 / 0:00