[PDF][PDF] Panoply: Low-TCB Linux Applications With SGX Enclaves.

S Shinde, D Le Tien, S Tople, P Saxena - NDSS, 2017 - shwetashinde.org
Intel SGX, a new security capability in emerging CPUs, allows user-level application code to
execute in hardwareisolated enclaves. Enclave memory is isolated from all other software …

Preventing page faults from telling your secrets

S Shinde, ZL Chua, V Narayanan… - … of the 11th ACM on Asia …, 2016 - dl.acm.org
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …

Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic

J Van Bulck, F Piessens, R Strackx - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Recent research on transient execution vulnerabilities shows that current processors exceed
our levels of understanding. The prominent Meltdown and Spectre attacks abruptly revealed …

Sok: Hardware-supported trusted execution environments

M Schneider, RJ Masti, S Shinde, S Capkun… - arxiv preprint arxiv …, 2022 - arxiv.org
The growing complexity of modern computing platforms and the need for strong isolation
protections among their software components has led to the increased adoption of Trusted …

{M2R}: Enabling stronger privacy in {MapReduce} computation

TTA Dinh, P Saxena, EC Chang, BC Ooi… - 24th USENIX Security …, 2015 - usenix.org
New big-data analysis platforms can enable distributed computation on encrypted data by
utilizing trusted computing primitives available in commodity server hardware. We study …

Elasticlave: An efficient memory model for enclaves

JZ Yu, S Shinde, TE Carlson, P Saxena - 31st USENIX Security …, 2022 - usenix.org
Trusted execution environments (TEEs) isolate user-space applications into secure
enclaves without trusting the OS. Existing TEE memory models are rigid — they do …

The Heisenberg defense: Proactively defending SGX enclaves against page-table-based side-channel attacks

R Strackx, F Piessens - arxiv preprint arxiv:1712.08519, 2017 - arxiv.org
Protected-module architectures (PMAs) have been proposed to provide strong isolation
guarantees, even on top of a compromised system. Unfortunately, Intel SGX--the only …

{BesFS}: A {POSIX} Filesystem for Enclaves with a Mechanized Safety Proof

S Shinde, S Wang, P Yuan, A Hobor… - 29th USENIX Security …, 2020 - usenix.org
New trusted computing primitives such as Intel SGX have shown the feasibility of running
user-level applications in enclaves on a commodity trusted processor without trusting a large …

Dynamic binary translation for sgx enclaves

J Cui, S Shinde, S Sen, P Saxena, P Yuan - ACM Transactions on …, 2022 - dl.acm.org
Enclaves, such as those enabled by Intel SGX, offer a hardware primitive for shielding user-
level applications from the OS. While enclaves are a useful starting point, code running in …

Identifying arbitrary memory access vulnerabilities in privilege-separated software

H Hu, ZL Chua, Z Liang, P Saxena - … 21-25, 2015, Proceedings, Part II 20, 2015 - Springer
Privilege separation is a widely used technique to secure complex software systems. With
privilege separation, software components are divided into several partitions and these …