Matches in SemOpenAlex for { <https://semopenalex.org/work/W4312552479> ?p ?o ?g. }
Showing items 1 to 74 of
74
with 100 items per page.
- W4312552479 abstract "Trusted Execution Environment (TEE) is the cornerstone of confidential computing. Among other TEEs, Intel® Secure Guard Extensions (Intel® SGX) is the most prominent solution that is frequently used in the public cloud to provide confidential computing services. Intel® SGX promotes runtime confidentiality and integrity of enclaves with minimal modifications to existing CPU microarchitectures. However, Transient Execution Attacks, such as L1 Terminal Fault (L1TF), Microarchitectural Data Sampling (MDS), and Transactional Asynchronous Abort (TAA) have exposed certain vulnerabilities within Intel® SGX solution. Over the past few years, Intel has developed various countermeasures against most of these vulnerabilities via microcode updates and hardware fixes. However, arguably, there are no existing tools nor studies that can measurably verify the effectiveness of these countermeasures. In this paper, we introduce an automated analysis tool, called ENCLYZER, to evaluate Transient Execution Vulnerabilities on Intel® SGX. We leverage ENCLYZER to comprehensively analyze a set of processors, with multiple versions of their microcode, to verify the correctness of these countermeasures. Our empirical analysis suggests that most countermeasures are effective in preventing attacks that are initiated from the same CPU hyperthread, but less effective for cross-thread attacks. Therefore, the application of the latest microcode patches and disabling hyperthreading is warranted to enhance the security of Intel® SGX-enabled systems. Security Configurations like hyperthreading disabled/enabled are attestable on Intel® SGX platform to provide user with increased confidence in making decision on system trustworthiness. Note that the Security Configurations cannot be modified without a system reboot." @default.
- W4312552479 created "2023-01-05" @default.
- W4312552479 creator A5021666829 @default.
- W4312552479 creator A5070946957 @default.
- W4312552479 creator A5071647717 @default.
- W4312552479 creator A5091455049 @default.
- W4312552479 date "2022-09-01" @default.
- W4312552479 modified "2023-10-16" @default.
- W4312552479 title "ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX" @default.
- W4312552479 cites W2011367000 @default.
- W4312552479 cites W2104182023 @default.
- W4312552479 cites W2124837944 @default.
- W4312552479 cites W2161782580 @default.
- W4312552479 cites W2162469911 @default.
- W4312552479 cites W2606774910 @default.
- W4312552479 cites W2705339670 @default.
- W4312552479 cites W2765227875 @default.
- W4312552479 cites W2769061097 @default.
- W4312552479 cites W2954241526 @default.
- W4312552479 cites W2963311060 @default.
- W4312552479 cites W2976763854 @default.
- W4312552479 cites W3015844221 @default.
- W4312552479 cites W3083271878 @default.
- W4312552479 cites W3152901657 @default.
- W4312552479 cites W3160448675 @default.
- W4312552479 doi "https://doi.org/10.1109/seed55351.2022.00020" @default.
- W4312552479 hasPublicationYear "2022" @default.
- W4312552479 type Work @default.
- W4312552479 citedByCount "0" @default.
- W4312552479 crossrefType "proceedings-article" @default.
- W4312552479 hasAuthorship W4312552479A5021666829 @default.
- W4312552479 hasAuthorship W4312552479A5070946957 @default.
- W4312552479 hasAuthorship W4312552479A5071647717 @default.
- W4312552479 hasAuthorship W4312552479A5091455049 @default.
- W4312552479 hasConcept C111919701 @default.
- W4312552479 hasConcept C138101251 @default.
- W4312552479 hasConcept C141141315 @default.
- W4312552479 hasConcept C141331961 @default.
- W4312552479 hasConcept C149635348 @default.
- W4312552479 hasConcept C173608175 @default.
- W4312552479 hasConcept C199360897 @default.
- W4312552479 hasConcept C202491316 @default.
- W4312552479 hasConcept C38652104 @default.
- W4312552479 hasConcept C41008148 @default.
- W4312552479 hasConcept C71745522 @default.
- W4312552479 hasConcept C79974875 @default.
- W4312552479 hasConceptScore W4312552479C111919701 @default.
- W4312552479 hasConceptScore W4312552479C138101251 @default.
- W4312552479 hasConceptScore W4312552479C141141315 @default.
- W4312552479 hasConceptScore W4312552479C141331961 @default.
- W4312552479 hasConceptScore W4312552479C149635348 @default.
- W4312552479 hasConceptScore W4312552479C173608175 @default.
- W4312552479 hasConceptScore W4312552479C199360897 @default.
- W4312552479 hasConceptScore W4312552479C202491316 @default.
- W4312552479 hasConceptScore W4312552479C38652104 @default.
- W4312552479 hasConceptScore W4312552479C41008148 @default.
- W4312552479 hasConceptScore W4312552479C71745522 @default.
- W4312552479 hasConceptScore W4312552479C79974875 @default.
- W4312552479 hasLocation W43125524791 @default.
- W4312552479 hasOpenAccess W4312552479 @default.
- W4312552479 hasPrimaryLocation W43125524791 @default.
- W4312552479 hasRelatedWork W1513907159 @default.
- W4312552479 hasRelatedWork W1567437828 @default.
- W4312552479 hasRelatedWork W1570068824 @default.
- W4312552479 hasRelatedWork W2097809386 @default.
- W4312552479 hasRelatedWork W2489591423 @default.
- W4312552479 hasRelatedWork W2523482099 @default.
- W4312552479 hasRelatedWork W2550975892 @default.
- W4312552479 hasRelatedWork W3135206727 @default.
- W4312552479 hasRelatedWork W761859031 @default.
- W4312552479 hasRelatedWork W1581434145 @default.
- W4312552479 isParatext "false" @default.
- W4312552479 isRetracted "false" @default.
- W4312552479 workType "article" @default.