DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jain, Prerit | ko |
dc.contributor.author | Desai, Soham | ko |
dc.contributor.author | Kim, Seong Min | ko |
dc.contributor.author | Shih, Ming Wei | ko |
dc.contributor.author | Lee, Jae Hyuk | ko |
dc.contributor.author | Choi, Chang Ho | ko |
dc.contributor.author | Shin, You Jung | ko |
dc.contributor.author | Kim, Tae Soo | ko |
dc.contributor.author | Kang, Brent Byunghoon | ko |
dc.contributor.author | Han, Dong Su | ko |
dc.date.accessioned | 2016-04-22T07:56:55Z | - |
dc.date.available | 2016-04-22T07:56:55Z | - |
dc.date.created | 2016-01-01 | - |
dc.date.created | 2016-01-01 | - |
dc.date.issued | 2016-02-21 | - |
dc.identifier.citation | The Network and Distributed System Security Symposium 2016 | - |
dc.identifier.uri | http://hdl.handle.net/10203/205766 | - |
dc.description.abstract | Hardware technologies for trusted computing, or trusted execution environments (TEEs), have rapidly matured over the last decade. In fact, TEEs are at the brink of widespread commoditization with the recent introduction of Intel Software Guard Extensions (Intel SGX). Despite such rapid development of TEE, software technologies for TEE significantly lag behind their hardware counterpart, and currently only a select group of researchers have the privilege of accessing this technology. To address this problem, we develop an open source platform, called OpenSGX, that emulates Intel SGX hardware components at the instruction level and provides new system software components necessarily required for full TEE exploration. We expect that the OpenSGX framework can serve as an open platform for SGX research, with the following contributions. First, we develop a fully functional, instruction-compatible emulator of Intel SGX for enabling the exploration of software/hardware design space, and development of enclave programs. OpenSGX provides a platform for SGX development, meaning that it provides not just emulation but also operating system components, an enclave program loader/packager, an OpenSGX user library, debugging, and performance monitoring. Second, to show OpenSGX's use cases, we applied OpenSGX to protect sensitive information (e.g., directory) of Tor nodes and evaluated their potential performance impacts. Therefore, we believe OpenSGX has great potential for broader communities to spark new research on soon-to-be-commodity Intel SGX. I. INTRODUCTION Hardware technologies for trusted computing, so called trusted execution environments (TEEs), have rapidly matured over the last decade [3, 18]. Trusted execution environments are at the brink of widespread commoditization with the recent introduction of Intel Software Guard Extensions (Intel SGX) [2, 19, 36]. Intel SGX allows an application, or its sub-component, to run inside an isolated execution environment, called an enclave. Intel SGX hardware protects the enclave against any malicious software, including operating system, hypervisor, and low-level firmware (e.g., SMM), which attempts to compromise its integrity or steal its secrecy. With the widespread adoption of cloud computing, the speculation is that Intel SGX can be a vehicle for enabling secure cloud computing and allowing many unforeseen security applications. | - |
dc.language | English | - |
dc.publisher | Internet Society | - |
dc.title | OpenSGX: An Open Platform for SGX Research | - |
dc.type | Conference | - |
dc.identifier.wosid | 000722005200037 | - |
dc.type.rims | CONF | - |
dc.citation.publicationname | The Network and Distributed System Security Symposium 2016 | - |
dc.identifier.conferencecountry | US | - |
dc.contributor.localauthor | Kang, Brent Byunghoon | - |
dc.contributor.localauthor | Han, Dong Su | - |
dc.contributor.nonIdAuthor | Jain, Prerit | - |
dc.contributor.nonIdAuthor | Desai, Soham | - |
dc.contributor.nonIdAuthor | Shih, Ming Wei | - |
dc.contributor.nonIdAuthor | Shin, You Jung | - |
dc.contributor.nonIdAuthor | Kim, Tae Soo | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.