- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
0004000000000000
- More
- Availability
-
40
- Author / Contributor
- Filter by Author / Creator
-
-
De Micheli, Gabrielle (4)
-
Micciancio, Daniele (3)
-
Cammarota, Rosario (1)
-
Dall, Fergus (1)
-
Eisenbarth, Thomas (1)
-
Genkin, Daniel (1)
-
Gupta, Saransh (1)
-
Heninger, Nadia (1)
-
Kim, Duhyeong (1)
-
Moghimi, Ahmad (1)
-
Nam, Yujin (1)
-
Pellet-Mary, Alice (1)
-
Rosing, Tajana (1)
-
Suhl, Adam (1)
-
Tran, Nam (1)
-
Wilkerson, Chris (1)
-
Yarom, Yuval (1)
-
Zhou, Minxuan (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
- Filter by Editor
-
-
Tang, Qiang (1)
-
Teague, Vanessa (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Nam, Yujin; Zhou, Minxuan; Gupta, Saransh; De Micheli, Gabrielle; Cammarota, Rosario; Wilkerson, Chris; Micciancio, Daniele; Rosing, Tajana (, IEEE)
-
Dall, Fergus; De Micheli, Gabrielle; Eisenbarth, Thomas; Genkin, Daniel; Heninger, Nadia; Moghimi, Ahmad; Yarom, Yuval (, IACR Transactions on Cryptographic Hardware and Embedded Systems)Intel Software Guard Extensions (SGX) allows users to perform secure computation on platforms that run untrusted software. To validate that the computation is correctly initialized and that it executes on trusted hardware, SGX supports attestation providers that can vouch for the user’s computation. Communication with these attestation providers is based on the Extended Privacy ID (EPID) protocol, which not only validates the computation but is also designed to maintain the user’s privacy. In particular, EPID is designed to ensure that the attestation provider is unable to identify the host on which the computation executes. In this work we investigate the security of the Intel implementation of the EPID protocol. We identify an implementation weakness that leaks information via a cache side channel. We show that a malicious attestation provider can use the leaked information to break the unlinkability guarantees of EPID. We analyze the leaked information using a lattice-based approach for solving the hidden number problem, which we adapt to the zero-knowledge proof in the EPID scheme, extending prior attacks on signature schemes.more » « less
An official website of the United States government

Full Text Available