YoVDO

The Wolf in SGX Clothing

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Security Vulnerabilities Courses Intel SGX Courses

Course Description

Overview

Explore the intricacies of Intel SGX (Software Guard Extensions) in this conference talk from TROOPERS18. Delve into the requirements, demonstrations, and key components of SGX, including enclaves, applications, and file system memory. Learn about helper functions, EDL files, and the differences between enclave and application environments. Examine practical examples such as the Martha Linux system, shell code, marshaling, and proxy mechanisms. Investigate the feasibility of ransomware in SGX contexts and analyze system calls through strace outputs. Gain valuable insights into the potential security implications and practical applications of Intel SGX technology.

Syllabus

Intro
Welcome
Introduction
Legal Disclaimer
Private Disclaimer
Intel STX
What is SGX
Requirements
Demos
Helper Functions
EDL Files
Enclave vs Application
File System Memory
Martha
Linux
System Call
Shell Code
Marshaling
Proxy
Ransomware
Feasibility
STrace
STrace Output
System Calls
Summary


Taught by

WEareTROOPERS

Related Courses

Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software
Paul G. Allen School via YouTube
Plundervolt - Flipping Bits from Software without Rowhammer
Black Hat via YouTube
When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins
Black Hat via YouTube
CLKscrew - Exposing the Perils of Security-Oblivious Energy Management
Black Hat via YouTube
Port Contention for Fun and Profit
IEEE via YouTube