Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Wolf in SGX Clothing

WEareTROOPERS via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Intel SGX (Software Guard Extensions) in this conference talk from TROOPERS18. Delve into the requirements, demonstrations, and key components of SGX, including enclaves, applications, and file system memory. Learn about helper functions, EDL files, and the differences between enclave and application environments. Examine practical examples such as the Martha Linux system, shell code, marshaling, and proxy mechanisms. Investigate the feasibility of ransomware in SGX contexts and analyze system calls through strace outputs. Gain valuable insights into the potential security implications and practical applications of Intel SGX technology.

Syllabus

Intro
Welcome
Introduction
Legal Disclaimer
Private Disclaimer
Intel STX
What is SGX
Requirements
Demos
Helper Functions
EDL Files
Enclave vs Application
File System Memory
Martha
Linux
System Call
Shell Code
Marshaling
Proxy
Ransomware
Feasibility
STrace
STrace Output
System Calls
Summary

Taught by

WEareTROOPERS

Reviews

Start your review of The Wolf in SGX Clothing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.