Security
1
Security 1 To read more This days papers: Smith and Weingart, - - PowerPoint PPT Presentation
Security 1 To read more This days papers: Smith and Weingart, Building a high-performance, programmable secure coprocessor, 1998, Sections 1-6, 10 Supplementary reading: Anderson, Security Engineering , Chapter 16.
1
Smith and Weingart, “‘Building a high-performance, programmable secure coprocessor”, 1998, Sections 1-6, 10
Anderson, Security Engineering, Chapter 16. http://www.cl.cam.ac.uk/~rja14/book.html Costan and Devadas, Intel SGX Explained
1
2
2
3
4
5
6
7
7
7
none
read/exec
read/write
read/write
…
read/execute
read/execute
read/execute
…
8
CR3 32 39 40 47 48 55 56 63 8 16 24 31 15 7 23
4K memory page Linear address: 64 bit PD entry
page directory
PDP entry page-directory- pointer table 64 bit PT entry
page table
PML4 entry PML4 table 9 9 40* 9 9 12 sign extended *) 40 bits aligned to a 4-KByte boundary
Diagram: Wikimedia / RokerHRO
9
Figure from Carter et al, “Hardware Support for Fast Capability-Based Addressing”
10
11
12
13
14
14
14
15
16
17
17
Appel, “Security Seals on Voting Machines: A Case Study”
18
19
2nd image: HexView “Inside YubiKey Neo” http://www.hexview.com/~scl/neo/
20
21
22
23
24
25
26
26
27
28
29
30
31
32
33
34
35
36
Figure from Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems
37
Figure from Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems
38
Messerges et al, “Investigations of Power Analysis Attacks on Smartcards”
39
40
41
42
43
44
Kommerling and Kuhn, “Design Principles for Tamper-Resistant Smartcard Processors”
45
46
47
48
48
48
49
50
Costan and Devadas, “Intel SGX Explained”
51
52
53
54
55
56
Costan and Devadas, “Intel SGX Explained”
57
58
59