Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

SGX Secure Enclaves in Practice - Security and Crypto Review

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the practical applications and security implications of Intel's Software Guard Extensions (SGX) technology in this 48-minute Black Hat conference talk. Dive into the first public assessment of SGX based on real hardware and Intel's software development environment. Learn about the implementation details, development process, and potential vulnerabilities of SGX enclaves. Discover how to create secure enclaves, debug SGX software, and analyze the cryptographic schemes used in critical components. Examine the attack surface and assess the real risks for SGX users. Witness demonstrations of cryptographic functionalities leveraging SGX, including secure remote storage and delegation. Gain insights into basic architectures that can deliver powerful crypto functionalities with wide-ranging applications. Access released code and a tool for extracting and verifying enclave metadata to enhance your understanding of SGX technology.

Syllabus

Introduction
SGX
SGX Overview
Cloud Computing
DRM
Reverse Engineer
Trust Computing Base
Security Limitations
Bugs
Setup
Linux SDK
Warning
What you get
SDK
Whats in the SDK
Debugging
Developer Key
Partitioning
Limitations
Sealing
Remote attestation
Disclaimer
Crypto
Crypto SDK
Where does it come from
Linux Source Code
AES
Randomness
Be careful
Canaan CLAV
How secure is it
PIDs
Applications
Encryption Proxy
Metadata
Demo
Conclusion

Taught by

Black Hat

Reviews

Start your review of SGX Secure Enclaves in Practice - Security and Crypto Review

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.