YoVDO

Undeserved Trust - Exploiting Permutation-Agnostic Remote Attestation

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Remote Attestation Courses

Course Description

Overview

Explore a cutting-edge security research presentation on exploiting permutation-agnostic remote attestation in Intel SGX. Delve into the findings of Luca Wilke, Jan Wichelmann, Florian Sieck, and Thomas Eisenbarth from the University of Lübeck as they reveal vulnerabilities in trusted execution environments. Learn about their novel attack method, which earned the best paper award at the 15th IEEE Workshop on Offensive Technologies (WOOT2021). Gain insights into the implications for secure enclaves and the importance of robust attestation mechanisms in modern computing systems.

Syllabus

[WOOT2021] undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Exploring Modern and Secure Operations of Kubernetes Clusters on the Edge
Open Data Science via YouTube
Using the Observer Effect and Cyber Feng Shui - Jacob Torrey
Hack In The Box Security Conference via YouTube
OAT - Attesting Operation Integrity of Embedded Devices
IEEE via YouTube
The Remote Working Security Conundrum - What Is Reasonably Secure Anyway?
USENIX via YouTube
Riverbed - Enforcing User-defined Privacy Constraints in Distributed Web Services
USENIX via YouTube