YoVDO

The Wolf in SGX Clothing

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Security Vulnerabilities Courses Intel SGX Courses

Course Description

Overview

Explore the intricacies of Intel SGX (Software Guard Extensions) in this conference talk from TROOPERS18. Delve into the requirements, demonstrations, and key components of SGX, including enclaves, applications, and file system memory. Learn about helper functions, EDL files, and the differences between enclave and application environments. Examine practical examples such as the Martha Linux system, shell code, marshaling, and proxy mechanisms. Investigate the feasibility of ransomware in SGX contexts and analyze system calls through strace outputs. Gain valuable insights into the potential security implications and practical applications of Intel SGX technology.

Syllabus

Intro
Welcome
Introduction
Legal Disclaimer
Private Disclaimer
Intel STX
What is SGX
Requirements
Demos
Helper Functions
EDL Files
Enclave vs Application
File System Memory
Martha
Linux
System Call
Shell Code
Marshaling
Proxy
Ransomware
Feasibility
STrace
STrace Output
System Calls
Summary


Taught by

WEareTROOPERS

Related Courses

Blockchain Scalability and its Foundations in Distributed Systems
The University of Sydney via Coursera
Don's Introduction to Ethical Hacking for Beginners
Udemy
Hacking und Netzwerkanalyse mit Wireshark - Der Komplettkurs
Udemy
Penetration Testing of Identity, Authentication and Authorization Mechanism
Pluralsight
ASP.NET MVC 5 Identity: Authentication and Authorization
LinkedIn Learning