Innovative instructions and software model for isolated execution

  • Authors:
  • Frank McKeen;Ilya Alexandrovich;Alex Berenzon;Carlos V. Rozas;Hisham Shafi;Vedvyas Shanbhogue;Uday R. Savagaonkar

  • Affiliations:
  • -;-;-;-;-;-;-

  • Venue:
  • Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

For years the PC community has struggled to provide secure solutions on open platforms. Intel has developed innovative new technology to enable SW developers to develop and deploy secure applications on open platforms. The technology enables applications to execute with confidentiality and integrity in the native OS environment. It does this by providing ISA extensions for generating hardware enforceable containers at a granularity determined by the developer. These containers while opaque to the operating system are managed by the OS. This paper analyzes the threats and attacks to applications. It then describes the ISA extension for generating a HW based container. Finally it describes the programming model of this container.