skip to main content
10.1145/2487726.2488370acmconferencesArticle/Chapter ViewAbstractPublication PageshaspConference Proceedingsconference-collections
research-article

Using innovative instructions to create trustworthy software solutions

Published: 23 June 2013 Publication History

Abstract

Software developers face a number of challenges when creating applications that attempt to keep important data confidential. Even with diligent attention paid to correct software design and implementation practices, secrets can still be exposed through a single flaw in any of the privileged code on the platform, code which may have been written by thousands of developers from hundreds of organizations throughout the world. Intel is developing innovative security technology which provides the ability for software developers to maintain control of the security of sensitive code and data by creating trusted domains within applications to protect critical information during execution and at rest. This paper will describe how this technology has been effectively used in lab exercises to protect private information in applications including enterprise rights management, video chat, trusted financial transactions, and others. Examples will include both protection of local processing and the establishment of secure communication with cloud services. It will illustrate useful software design patterns that can be followed to create many additional types of trusted software solutions.

Cited By

View all
  • (2025)Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things ScenariosFuture Internet10.3390/fi1701003217:1(32)Online publication date: 13-Jan-2025
  • (2024)Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy BudgetProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670281(1909-1923)Online publication date: 2-Dec-2024
  • (2024)Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning AggregationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347253119(9744-9759)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HASP '13: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
June 2013
77 pages
ISBN:9781450321181
DOI:10.1145/2487726
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 June 2013

Check for updates

Qualifiers

  • Research-article

Conference

HASP '13
Sponsor:

Acceptance Rates

HASP '13 Paper Acceptance Rate 9 of 13 submissions, 69%;
Overall Acceptance Rate 9 of 13 submissions, 69%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things ScenariosFuture Internet10.3390/fi1701003217:1(32)Online publication date: 13-Jan-2025
  • (2024)Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy BudgetProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670281(1909-1923)Online publication date: 2-Dec-2024
  • (2024)Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning AggregationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347253119(9744-9759)Online publication date: 2024
  • (2024)Ensuring State Continuity for Confidential Computing: A Blockchain-Based ApproachIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.338197321:6(5635-5649)Online publication date: Nov-2024
  • (2024)Distributed & Scalable Oblivious Sorting and Shuffling2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00153(4277-4295)Online publication date: 19-May-2024
  • (2024)Bulkor: Enabling Bulk Loading for Path ORAM2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00103(4258-4276)Online publication date: 19-May-2024
  • (2024)Tutorial: Information Leakage from Cryptographic Techniques2024 IEEE 44th International Conference on Distributed Computing Systems Workshops (ICDCSW)10.1109/ICDCSW63686.2024.00007(9-12)Online publication date: 23-Jul-2024
  • (2024)Data Enclave: A Data-Centric Trusted Execution Environment2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA)10.1109/HPCA57654.2024.00026(218-232)Online publication date: 2-Mar-2024
  • (2024)Data Confidentiality in Machine Learning: Exploring Multivariate Regression and Its Application on Encrypted Medical DataSN Computer Science10.1007/s42979-024-02657-z5:4Online publication date: 28-Mar-2024
  • (2024)A Comparative Analysis of Rust-Based SGX Frameworks: Implications for Building SGX ApplicationsInformation Security and Cryptology – ICISC 202310.1007/978-981-97-1238-0_1(3-19)Online publication date: 8-Mar-2024
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media