Explore the intricacies of Intel SGX (Software Guard Extensions) in this conference talk from TROOPERS18. Delve into the requirements, demonstrations, and key components of SGX, including enclaves, applications, and file system memory. Learn about helper functions, EDL files, and the differences between enclave and application environments. Examine practical examples such as the Martha Linux system, shell code, marshaling, and proxy mechanisms. Investigate the feasibility of ransomware in SGX contexts and analyze system calls through strace outputs. Gain valuable insights into the potential security implications and practical applications of Intel SGX technology.
Overview
Syllabus
Intro
Welcome
Introduction
Legal Disclaimer
Private Disclaimer
Intel STX
What is SGX
Requirements
Demos
Helper Functions
EDL Files
Enclave vs Application
File System Memory
Martha
Linux
System Call
Shell Code
Marshaling
Proxy
Ransomware
Feasibility
STrace
STrace Output
System Calls
Summary
Taught by
WEareTROOPERS