Knowing what a program does is difficult enough when looking at it on
its own. But in reality, nothing runs on thin air, so the Trusted
Computing Base is usually complex beyond reasoning and consists of many
things outside your control.
Research on Isolated Program Execution
Vortrag zum Forschungsthema
This talk will give an overview of several approaches to limit a
program's TCB on general-purpose systems. In addition, it shows some
ways to exploit programs running under Intel SGX, as well as attempts to
refute those attacks.