skip to main content
10.1145/2995306.2995307acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
invited-talk

Intel Software Guard Extensions: Introduction and Open Research Challenges

Published: 28 October 2016 Publication History

Abstract

Hardware-enhanced security is an important pillar of secure systems in general and software protection in particular. This presentation will survey the recently announced Intel Software Guard Extensions (Intel SGX) as well as innovative usages for building secure systems using security-enhanced hardware. Intel SGX is an Intel technology for application developers who are seeking to protect select code and data from disclosure or modification. Intel SGX makes such protections possible through the use of enclaves, which are protected areas of execution. Security critical application code can be put into an enclave by special instructions and is then hardware protected from attacks by other potentially malicious software. An enclave can therefore be shielded against attacks by untrusted application parts, by other applications, and also against attacks by a compromised operating system.

Cited By

View all
  • (2024)Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW61312.2024.00029(217-224)Online publication date: 8-Jul-2024
  • (2024)Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification MethodJournal of Information Security and Applications10.1016/j.jisa.2024.10387386(103873)Online publication date: Nov-2024
  • (2024)Secure Processor ArchitecturesHandbook of Computer Architecture10.1007/978-981-97-9314-3_10(171-199)Online publication date: 21-Dec-2024
  • Show More Cited By

Index Terms

  1. Intel Software Guard Extensions: Introduction and Open Research Challenges

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SPRO '16: Proceedings of the 2016 ACM Workshop on Software PROtection
      October 2016
      100 pages
      ISBN:9781450345767
      DOI:10.1145/2995306
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 October 2016

      Check for updates

      Author Tags

      1. confidentiality
      2. enclaves
      3. hardware-enhanced security
      4. integrity
      5. isolation
      6. privacy

      Qualifiers

      • Invited-talk

      Conference

      CCS'16
      Sponsor:

      Acceptance Rates

      SPRO '16 Paper Acceptance Rate 8 of 14 submissions, 57%;
      Overall Acceptance Rate 8 of 14 submissions, 57%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)14
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW61312.2024.00029(217-224)Online publication date: 8-Jul-2024
      • (2024)Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification MethodJournal of Information Security and Applications10.1016/j.jisa.2024.10387386(103873)Online publication date: Nov-2024
      • (2024)Secure Processor ArchitecturesHandbook of Computer Architecture10.1007/978-981-97-9314-3_10(171-199)Online publication date: 21-Dec-2024
      • (2024)enCloud: Aspect‐oriented trusted service migration on SGX‐enabled cloud VMSoftware: Practice and Experience10.1002/spe.335754:12(2454-2480)Online publication date: 18-Jun-2024
      • (2023)Trust-DETM: Distributed Energy Trading Model Based on Trusted Execution EnvironmentMathematics10.3390/math1113293411:13(2934)Online publication date: 30-Jun-2023
      • (2023)Mitigating Adversarial Attacks by Distributing Different Copies to Different BuyersProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3582824(704-715)Online publication date: 10-Jul-2023
      • (2023)Security Verification of Low-Trust ArchitecturesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616643(945-959)Online publication date: 15-Nov-2023
      • (2023)Quantum Static Remote Attestation2023 IEEE 9th World Forum on Internet of Things (WF-IoT)10.1109/WF-IoT58464.2023.10539576(01-06)Online publication date: 12-Oct-2023
      • (2023)Decentralized SGX-Based Cloud Key ManagementNetwork and System Security10.1007/978-3-031-39828-5_18(327-341)Online publication date: 7-Aug-2023
      • (2022)Sequestered Encryption: A Hardware Technique for Comprehensive Data Privacy2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED)10.1109/SEED55351.2022.00014(73-84)Online publication date: Sep-2022
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media