Abstract
The first part of the talk discusses some potential implications of attacks on the system memory of a computing platform. We show that encryption to protect privacy is not necessarily sufficient to protect against active attacks. In the second part of the talk, we explore the Memory Encryption Engine, which is part of Intel's Software Guard Extensions (SGX) technology.
Original language | English |
---|---|
Title of host publication | Proceedings - 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016 |
Editors | Philippe Maurine, Michael Tunstall |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 1-3 |
Number of pages | 3 |
ISBN (Electronic) | 9781509011087 |
DOIs | |
State | Published - 5 Dec 2016 |
Event | 13th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016 - Santa Barbara, United States Duration: 16 Aug 2016 → … |
Publication series
Name | Proceedings - 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016 |
---|
Conference
Conference | 13th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016 |
---|---|
Country/Territory | United States |
City | Santa Barbara |
Period | 16/08/16 → … |
Bibliographical note
Publisher Copyright:© 2016 IEEE.
Keywords
- Active attacks on memory
- memory encryption
ASJC Scopus subject areas
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications