Innovative Technology for CPU Based Attestation and Sealing Ittai

@inproceedings{Anati2013InnovativeTF,
  title={Innovative Technology for CPU Based Attestation and Sealing Ittai},
  author={Anati and Shay Gueron and S. P. Johnson and Vincent Scarlata},
  year={2013}
}
Intel is developing the Intel® Software Guard Extensions (Intel® SGX) technology, an extension to Intel® Architecture for generating protected software containers. The container is referred to as an enclave. Inside the enclave, software’s code, data, and stack are protected by hardware enforced access control policies that prevent attacks against the enclave’s content. In an era where software and services are deployed over the Internet, it is critical to be able to securely provision enclaves… CONTINUE READING
Highly Influential
This paper has highly influenced 79 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 395 citations. REVIEW CITATIONS
265 Citations
10 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 265 extracted citations

395 Citations

050100150'13'14'15'16'17'18
Citations per Year
Semantic Scholar estimates that this publication has 395 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 10 references

Trusted Platform Module Main Specification (TPM1.0)

  • Trusted Computing Group
  • March 2011. [Online]. Available: http://www…
  • 2011
Highly Influential
6 Excerpts

FIPS 180-4:Secure Hash Standard

  • NIST
  • NIST, Gaithersburg, 2012.
  • 2012
Highly Influential
3 Excerpts

Intel(r) 64 and IA-32 Architectures Software Developers Reference Manual

  • Intel
  • June 2013. [Online]. Available: http://www.intel…
  • 2013
1 Excerpt

Trusted Platform Module Library Specification (TPM2.0)

  • Trusted Computing Group
  • March 2013. [Online]. Available: http://www…
  • 2013
1 Excerpt

Special Publication 800-38B: Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication

  • NIST
  • May 2005. [Online]. Available: http://csrc.nist…
  • 2005
1 Excerpt

Similar Papers

Loading similar papers…