Enclaves for operating system protection

@article{Torrey2016EnclavesFO,
  title={Enclaves for operating system protection},
  author={Jacob I. Torrey and Brent M. Sherman},
  journal={2016 Annual IEEE Systems Conference (SysCon)},
  year={2016},
  pages={1-5}
}
As networks become increasingly targeted by attackers in search of sensitive data, a new data protection model is arising — one in which data aims to be protected even on contested networks. In this new paradigm, a stronger isolation boundary is needed than the current process model of the status quo affords — hardware-enforced enclaves are a step towards… CONTINUE READING