Next Generation Secure Computer Architectures
Next Generation Secure Computer Architectures
Seminare | 2 SWS / 5 ECTS (Kursbeschreibung) |
Veranstalter: | |
Beginn: | 2019-04-30 |
Vorbesprechung: Di, 29.1. um 10:30 Uhr im Raum 01.08.033 [Folien]
Termine (geplant):
- Zwischenevaluation:
- Di, 30.04.2019 - 10-12 Uhr - 01.08.033
- Vorträge:
- Do, 27.06.2019 - 09-18 Uhr - 01.08.033
- Fr, 28.06.2019 - 09-18 Uhr - 01.08.033
Verantwortliche:
- Matthias Hiller
- Lukas Auer
- Johannes Obermaier
- Kathrin Garb
Registrierung:
- Interessierte melden sich bitte über das reguläre Matching-System der Fakultät für Informatik an der Veranstaltung an.
Mögliche Themen umfassen:
-
AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing
- AEGIS is a processor architecture, secure against both physical and software attacks. It assumes that all external components, as well as the operation system, are untrustable. Physical and software tampering is detected by tamper-evident and authenticated environments. In addition, environments are private to prevent an adversary from obtaining information by tampering with or observing system operation.
-
Oblivious RAM Protocols
- Oblivious RAM (ORAM) prevents access pattern leakage to hide the sequence of operations being performed. Specifically, the sequence in which memory locations are accessed is equivalent for all inputs with the same access time. ORAM solutions provide strong privacy guarantees since an observer is unable to distinguish accesses from random. They are used in applications such as secure cloud storage, secure multi-party computation, and secure processors.
-
Survey over Intel SGX Extensions and ARM TrustZone
- Intel Software Guard Extensions (SGX) allows user-code to run in isolated memory regions (enclaves), which are protected from code running at higher privilege levels. It aims to provide integrity and confidentiality guarantees (secure remote computation) in a potentially malicious software environment.
-
Sanctum Hardware Extensions for Strong Software Isolation
- Sanctum is an alternative to Intel’s Software Guard Extensions (SGX). It provides strong provable isolation of software modules running concurrently with shared resources. Unlike SGX, which is implemented in microcode, Sanctum is mostly implemented with trusted software and is therefore easier to analyze. A prototype of the extension is implemented with the Rocket RISC-V core.
-
The CHERI capability model: Revisiting RISC in an age of risk
- CHERI (Capability Hardware Enhanced RISC Instructions) is an extension to 64-bit RISC instruction set architectures (ISA). It introduces a hybrid capability-system to allow software to efficiently implement fine-grained memory protection policies and software compartmentalization. FreeBSD and the LLVM compiler have been modified to take advantage of the CHERI extension.
-
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
- CHAINIAC is a decentralized software-update framework with the goal of eliminating single points of failure, enforcing transparency, and providing efficient verifiability of integrity and authenticity. Signed software-updates are collected in a tamper-proof release log based on the skipchain, a cryptographically-traversable, offline- and peer-to-peer-verifiable blockchain structure.
-
Invasive Computing
- Invasive computing is a new processing paradigm for Multi-Processor Systems-on-Chip (MPSoCs). Programs can dynamically scale from running on just one processor to multiple, neighboring processors. This first phase of expanding to multiple processors is the invasion step. After the highly parallel processing phase, programs scale the consumed resources back in the retreat step.
-
Formal Foundation for Secure Remote Execution of Enclave
- This paper introduces a verification methodology for trusted hardware platforms such as Intel SGX and the MIT Sanctum extension. It formalizes an idealized enclave platform along with a parameterized adversary. In addition, it formalizes the notion of secure remote execution and presents machine-checked proofs for its three key security properties: integrity, confidentiality, and secure measurement.
- Weitere Themenvorschläge durch Studierende können berücksichtigt werden.