YoVDO

The Wolf in SGX Clothing

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Security Vulnerabilities Courses Intel SGX Courses

Course Description

Overview

Explore the intricacies of Intel SGX (Software Guard Extensions) in this conference talk from TROOPERS18. Delve into the requirements, demonstrations, and key components of SGX, including enclaves, applications, and file system memory. Learn about helper functions, EDL files, and the differences between enclave and application environments. Examine practical examples such as the Martha Linux system, shell code, marshaling, and proxy mechanisms. Investigate the feasibility of ransomware in SGX contexts and analyze system calls through strace outputs. Gain valuable insights into the potential security implications and practical applications of Intel SGX technology.

Syllabus

Intro
Welcome
Introduction
Legal Disclaimer
Private Disclaimer
Intel STX
What is SGX
Requirements
Demos
Helper Functions
EDL Files
Enclave vs Application
File System Memory
Martha
Linux
System Call
Shell Code
Marshaling
Proxy
Ransomware
Feasibility
STrace
STrace Output
System Calls
Summary


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube