Enclaves for operating system protection

  title={Enclaves for operating system protection},
  author={Jacob I. Torrey and Brent M. Sherman},
  journal={2016 Annual IEEE Systems Conference (SysCon)},
As networks become increasingly targeted by attackers in search of sensitive data, a new data protection model is arising — one in which data aims to be protected even on contested networks. In this new paradigm, a stronger isolation boundary is needed than the current process model of the status quo affords — hardware-enforced enclaves are a step towards… CONTINUE READING