SysTEX '16

1st Workshop on System Software for Trusted Execution (SysTEX 2016)

December 12, 2016

Program

9:00-10:00 Invited keynote by Ittai Anati (Intel)
  • TEE - More than just a secure container. The importance of TCB updates (slides)
    Intel Software Guard Extensions (Intel® SGX) protects selected code and data from disclosure or modification. Developers can partition their application into CPU hardened "enclaves" or protected areas of execution that increase security even on compromised platforms. The talk will focus on the very important architectural ingredient, although less in the spotlight, the built-in support for hardware based attestation. The talk will cover the concepts of provisioning, attestation, and TCB recovery and describe the way Intel® SGX addresses the matter.
    Ittai Anati is a Senior Principal Engineer security architect at Intel corporation. In his last assignment Ittai lead the architecture team that incorporated Intel® Software Guard Extensions (Intel® SGX) into Intel's 6th generation Core.
10:00-10:30 Coffee break

10:30-12:15 Session 1: System support
  • Isolating Operating System Components with Intel SGX (pdf, slides)
    Lars Richter, Johannes Götzfried, and Tilo Müller (FAU Erlangen-Nuremberg)
  • Overhead-free I/O from enclaves (slides)
    Meni Orenbach and Mark Silberstein (Technion)
  • Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control (pdf, slides)
    Marcus Völp (SnT - University of Luxembourg), Adam Lackorzynski (Kernkonzept GmbH and TU Dresden), and Jeremie Decouchant, Vincent Rahli, Francisco Rocha, and Paulo Verissimo (SnT - University of Luxembourg)
  • Round table (15 min)

12:15-13:45 Lunch

13:45-15:30 Session 2: Applications
  • A Case for Protecting Computer Games With SGX (pdf, slides)
    Erick Bauman and Zhiqiang Lin (UT Dallas)
  • Mitigating Password Database Breaches with Intel SGX (pdf, slides)
    Helena Brekalo, Raoul Strackx, and Frank Piessens (KU Leuven)
  • Protecting Password Databases using Trusted Hardware (pdf, slides)
    Klaudia Krawiecka, Andrew Paverd, and N. Asokan (Aalto University)
  • Round table (15 min)

15:30-16:00 Coffee break

16:00-17:00 Session 3: Applications
  • Proof of Luck: an Efficient Blockchain Consensus Protocol (pdf, slides)
    Mitar Milutinovic, Warren He, Howard Wu, and Maxinder Kanwal (UC Berkeley)
  • Exploring the use of Intel SGX for Secure Many-Party Applications (pdf, slides)
    Kubilay Ahmet Küçük (University of Oxford), Andrew Paverd (Aalto University), Andrew Martin (University of Oxford), N. Asokan (Aalto University), and Andrew Simpson and Robin Ankele (University of Oxford)
  • Round table (10 min)

17:00-17:15 Short break

17:15-18:00 Session 4: Addtional measures
  • Developing Secure SGX Enclaves: New Challenges on the Horizon (pdf, slides)
    Raoul Strackx and Frank Piessens (KU Leuven)
  • Analysis of Trusted Execution Environment usage in Samsung KNOX (pdf)
    Ahmad Atamli-Reineh, Ravishankar Borgaonkar, and Ranjbar A. Balisane (University of Oxford), Giuseppe Petracca (Pennsylvania State University), and Andrew Martin (University of Oxford)
  • Round table (10 min)