I am Dave Jing Tian, an Assistant Professor in the Department of Computer Science at Purdue University working on system security. My research involves embedded systems, operating systems, trusted and confidential computing, and hardware security and trust. All opinions are my own.
- 236,456 hits
All blogs on this website are licensed under a Creative Commons Attribution 4.0 International License.
Tag Archives: intel
Speculations on Intel SGX Card
One of the exciting things Intel has brought to RSA 2019 is Intel SGX Card . Yet there is not much information about this coming hardware. This post collects some related documentation from Intel and speculates what could happen within … Continue reading
Kernel Code Execution Time Measurement (kcetm)
This post mainly talks about the correct usage of tsc counters provided by Intel x86/x86-64 architectures to measure the Linux kernel code execution time. Most of the content here is borrowed/inspired from . Note that this is NOT a post … Continue reading
Some notes on the Monotonic Counter in Intel SGX and ME
SGX sealing is vulnerable to rollback attacks as the enclave is not able to tell if the sealed data is the latest or a old copy. To mitigate this attack, monotonic counter (MC) has been introduced in Intel SGX SDK … Continue reading
SGX Bug SKL012 and CHIPSEC
Intel SGX CPU (staring from Skylake) has been there for while. The good news is that there is still no known exploitation against SGX self yet, though there are some exploitations in the enclave code and Intel SGX SDK. In … Continue reading
nested KVM – just for fun
KVM is based on virtualization instruction set – either Intel vmx or AMD svm, which provides the ability to run the VM directly without emulation or translation. In other words, KVM could only be enabled if it sees vmx/svm in … Continue reading