Show simple item record

dc.contributor.authorCostan, Victor
dc.contributor.authorLebedev, Ilia
dc.contributor.authorDevadas, Srinivas
dc.date.accessioned2021-11-05T16:22:34Z
dc.date.available2021-11-05T16:22:34Z
dc.date.issued2016
dc.identifier.urihttps://hdl.handle.net/1721.1/137536
dc.description.abstractSanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable isolation of software modules running concurrently and sharing resources, but protects against an important class of additional software attacks that infer private information from a program’s memory access patterns. Sanctum shuns unnecessary complexity, leading to a simpler security analysis. We follow a principled approach to eliminating entire attack surfaces through isolation, rather than plugging attack-specific privacy leaks. Most of Sanctum’s logic is implemented in trusted software, which does not perform cryptographic operations using keys, and is easier to analyze than SGX’s opaque microcode, which does. Our prototype targets a Rocket RISC-V core, an open implementation that allows any researcher to reason about its security properties. Sanctum’s extensions can be adapted to other processor cores, because we do not change any major CPU building block. Instead, we add hardware at the interfaces between generic building blocks, without impacting cycle time. Sanctum demonstrates that strong software isolation is achievable with a surprisingly small set of minimally invasive hardware changes, and a very reasonable overhead.en_US
dc.language.isoen
dc.relation.isversionofhttps://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/costanen_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceOther repositoryen_US
dc.titleSanctum: Minimal Hardware Extensions for Strong Software Isolationen_US
dc.typeArticleen_US
dc.identifier.citationCostan, Victor, Lebedev, Ilia and Devadas, Srinivas. 2016. "Sanctum: Minimal Hardware Extensions for Strong Software Isolation."
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2019-05-28T16:17:18Z
dspace.date.submission2019-05-28T16:17:19Z
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record