I am Dave Jing Tian, an Assistant Professor in the Department of Computer Science at Purdue University working on system security. My research involves embedded systems, operating systems, and trusted computing. All opinions are my own.
- 159,316 hits
All blogs on this website are licensed under a Creative Commons Attribution 4.0 International License.
Tag Archives: intel
One of the exciting things Intel has brought to RSA 2019 is Intel SGX Card . Yet there is not much information about this coming hardware. This post collects some related documentation from Intel and speculates what could happen within … Continue reading
This post mainly talks about the correct usage of tsc counters provided by Intel x86/x86-64 architectures to measure the Linux kernel code execution time. Most of the content here is borrowed/inspired from . Note that this is NOT a post … Continue reading
SGX sealing is vulnerable to rollback attacks as the enclave is not able to tell if the sealed data is the latest or a old copy. To mitigate this attack, monotonic counter (MC) has been introduced in Intel SGX SDK … Continue reading
Intel SGX CPU (staring from Skylake) has been there for while. The good news is that there is still no known exploitation against SGX self yet, though there are some exploitations in the enclave code and Intel SGX SDK. In … Continue reading