Attacks on Encrypted Memory and Constructions for Memory Protection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The first part of the talk discusses some potential implications of attacks on the system memory of a computing platform. We show that encryption to protect privacy is not necessarily sufficient to protect against active attacks. In the second part of the talk, we explore the Memory Encryption Engine, which is part of Intel's Software Guard Extensions (SGX) technology.

Original languageEnglish
Title of host publicationProceedings - 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016
EditorsPhilippe Maurine, Michael Tunstall
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-3
Number of pages3
ISBN (Electronic)9781509011087
DOIs
StatePublished - 5 Dec 2016
Event13th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016 - Santa Barbara, United States
Duration: 16 Aug 2016 → …

Publication series

NameProceedings - 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016

Conference

Conference13th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016
Country/TerritoryUnited States
CitySanta Barbara
Period16/08/16 → …

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

Keywords

  • Active attacks on memory
  • memory encryption

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Attacks on Encrypted Memory and Constructions for Memory Protection'. Together they form a unique fingerprint.

Cite this