Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software

Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software

Paul G. Allen School via YouTube Direct link

EADD pseudocode

4 of 22

4 of 22

EADD pseudocode

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Intel SGX
  3. 3 SGX is complex
  4. 4 EADD pseudocode
  5. 5 EINIT pseudocode
  6. 6 SGX limitations
  7. 7 Example: memory management
  8. 8 The fundamental problem
  9. 9 Project Komodo
  10. 10 Komodo architecture
  11. 11 Prototype on ARM TrustZone
  12. 12 Komodo API
  13. 13 Verification overview
  14. 14 Proving security via non-interference
  15. 15 Verified assembly in Vale
  16. 16 Implementation
  17. 17 Notary performance
  18. 18 Verification effort
  19. 19 Experiences
  20. 20 Related work
  21. 21 Future work
  22. 22 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.