TUM Logo

Next Generation Secure Computer Architectures

Next Generation Secure Computer Architectures  

Seminare 2 SWS / 5 ECTS (Kursbeschreibung)
Veranstalter: Thomas Kittel
Beginn:


Vorbesprechung: Di, 06.2. um 09:30 Uhr im Raum 01.08.033 [Folien]

Termine (geplant):

  • Zwischenevaluation:
    • Fr, 27.04.2018 - 10-12 Uhr - 01.08.033
  • Vorträge:
    • Do, 28.06.2018 - 09-18 Uhr - 01.08.033
    • Fr, 29.06.2018 - 09-18 Uhr - 01.08.033

Verantwortliche:

  • Matthias Hiller
  • Lukas Auer
  • Vincent Immler

Mögliche Themen umfassen:

 

 

  • Survey over Intel SGX Extensions and ARM TrustZone

    • Intel Software Guard Extensions (SGX) allows user-code to run in isolated memory regions (enclaves), which are protected from code running at higher privilege levels. It aims to provide integrity and confidentiality guarantees (secure remote computation) in a potentially malicious software environment.

 

 

 

 

  • Invasive Computing

    • Invasive computing is a new processing paradigm for Multi-Processor Systems-on-Chip (MPSoCs). Programs can dynamically scale from running on just one processor to multiple, neighboring processors. This first phase of expanding to multiple processors is the invasion step. After the highly parallel processing phase, programs scale the consumed resources back in the retreat step.

 

  • Formal Foundation for Secure Remote Execution of Enclave

    • This paper introduces a verification methodology for trusted hardware platforms such as Intel SGX and the MIT Sanctum extension. It formalizes an idealized enclave platform along with a parameterized adversary. In addition, it formalizes the notion of secure remote execution and presents machine-checked proofs for its three key security properties: integrity, confidentiality, and secure measurement.

 

  • Weitere Themenvorschläge durch Studierende können berücksichtigt werden.