Trusted Execution Environment
Trusted Execution Environment
Seminare | 2 SWS / 5 ECTS |
Veranstalter: | Fabian Franzen |
Zeit und Ort: | Preliminary Meeting: Monday, 13 July 2020, 14.30 till 15.15 h, Online Konferenz, Link: https://s.fhg.de/in-tum-seminare-wise20 |
Beginn: |
Art |
Master-Seminar |
Vortragende/Mitwirkende |
Meyer zum Felde, Hendrik
|
Inhalte |
Participants independently write a seminar paper about a challenging scientific topic and present, analyze, evaluate and discuss the results. The paper summarizes the essential concepts of the topic and includes a list of references. Possible topics include: · Intel Software Guard Extensions (SGX): · - Comparison of existing Trusted Execution Environments (AMD SEV, ARM TrustZone, Intel SGX, ...) · - Limitations and Possibilities of Intel SGX Enclaves with respect to RAM limitations of 128MB · - Limitations and Possibilities of Intel SGX Enclaves with respect to communication and interaction with a TPM · AMD Secure Extension Mode (SEM): · - Analysis of bug history and improvement ideas · AMD Platform Security Processor (PSP): · - Analysis of bug history and improvement ideas · Remote attestation via TEE: · - Is Property-based attestation currently dead? If yes can it be revived? · - Realizing semantic attestation via TEE · Remote Policy Enforcement via TEE: · - Practical issues in the construction of a policy engine fitting inside a TEE Students can also propose own topics. |
Inhaltliche Voraussetzungen |
· Basic knowledge in cryptography · Basic knowledge in operating systems · Basic knowledge in network communication |
Ziele (erwartete Lernergebnisse und erworbene Kompetenzen) |
· Understand, prepare and present a scientific topic · Understand the possibilities and limitations of technologies for memory protection |
Unterrichts-/ |
Deutsch/Englisch |
Lehr- und Lernmethode |
Compact course, development of a scientific topic, if applicable with a small practical part |
Teilnahmekriterien & Anmeldung |
Maximum number of participants is 10. |