I am Dave, a Ph.D. student in the department of Computer & Information Science & Engineering (CISE) at the University of Florida. I am a founding member of FICS (Florida Institute for Cybersecurity) Research. My research involves system infrastructure, security and storage. I am interested in Linux kernel hacking, compilers and machine learning stuffs. I also play guitars though not professionally when I am tired of coding:)
- 122,514 hits
All blogs on this website are licensed under a Creative Commons Attribution 4.0 International License.
Tag Archives: intel
This post mainly talks about the correct usage of tsc counters provided by Intel x86/x86-64 architectures to measure the Linux kernel code execution time. Most of the content here is borrowed/inspired from . Note that this is NOT a post … Continue reading
SGX sealing is vulnerable to rollback attacks as the enclave is not able to tell if the sealed data is the latest or a old copy. To mitigate this attack, monotonic counter (MC) has been introduced in Intel SGX SDK … Continue reading
Intel SGX CPU (staring from Skylake) has been there for while. The good news is that there is still no known exploitation against SGX self yet, though there are some exploitations in the enclave code and Intel SGX SDK. In … Continue reading