all InfoSec news
Designing a Provenance Analysis for SGX Enclaves. (arXiv:2206.07418v1 [cs.CR])
June 16, 2022, 1:20 a.m. | Flavio Toffalini, Mathias Payer, Jianying Zhou, Lorenzo Cavallaro
cs.CR updates on arXiv.org arxiv.org
Intel SGX enables memory isolation and static integrity verification of code
and data stored in user-space memory regions called enclaves. SGX effectively
shields the execution of enclaves from the underlying untrusted OS. Attackers
cannot tamper nor examine enclaves' content. However, these properties equally
challenge defenders as they are precluded from any provenance analysis to infer
intrusions inside SGX enclaves. In this work, we propose SgxMonitor, a novel
provenance analysis to monitor and identify anomalous executions of enclave
code. To this …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Associate Manager, BPT Infrastructure & Ops (Security Engineer)
@ SC Johnson | PHL - Makati
Cybersecurity Analyst - Project Bound
@ NextEra Energy | Jupiter, FL, US, 33478
Lead Cyber Security Operations Center (SOC) Analyst
@ State Street | Quincy, Massachusetts
Junior Information Security Coordinator (Internship)
@ Garrison Technology | London, Waterloo, England, United Kingdom
Sr. Security Engineer
@ ScienceLogic | Reston, VA