Главная
Study mode:
on
1
Intro
2
Intel SGX
3
SGX is complex
4
EADD pseudocode
5
EINIT pseudocode
6
SGX limitations
7
Example: memory management
8
The fundamental problem
9
Project Komodo
10
Komodo architecture
11
Prototype on ARM TrustZone
12
Komodo API
13
Verification overview
14
Proving security via non-interference
15
Verified assembly in Vale
16
Implementation
17
Notary performance
18
Verification effort
19
Experiences
20
Related work
21
Future work
22
Conclusion
Description:
Explore a systems and networks seminar featuring Andrew Baumann from Microsoft Research as he presents "Komodo: using verification to disentangle secure-enclave hardware from software." Dive into the complexities of Intel SGX and its promise of powerful security for user-mode enclaves. Learn about the challenges of hardware-based security solutions and their dependence on CPU deployments. Discover Komodo, an alternative approach to achieving attested, on-demand, user-mode, concurrent isolated execution by decoupling core hardware mechanisms from a privileged software monitor. Examine the implementation of a Komodo prototype in verified assembly code on an ARM TrustZone platform, showcasing its practicality and performance. Gain insights into the project's goal of achieving security equivalent to or better than SGX while enabling independent deployment of new enclave features. Delve into topics such as Intel SGX complexities, Komodo architecture, verification processes, and future work in this comprehensive lecture on secure enclave systems. Read more

Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software

Paul G. Allen School
Add to list