Skip to content

Commit 2308bfc

Browse files
sangfanshgitbook-bot
authored andcommitted
GitBook: [master] 23 pages and 24 assets modified
1 parent 1560530 commit 2308bfc

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+1693
-0
lines changed

.gitbook/assets/aesm.png

196 KB
Loading

.gitbook/assets/aesm.socket.png

65.3 KB
Loading

.gitbook/assets/aesm_position.png

285 KB
Loading

.gitbook/assets/attestation.png

287 KB
Loading

.gitbook/assets/christof.pdf

11.1 MB
Binary file not shown.

.gitbook/assets/enclave1 (1).png

215 KB
Loading

.gitbook/assets/enclave1.png

53.9 KB
Loading

.gitbook/assets/enclave2 (1).png

66.8 KB
Loading

.gitbook/assets/enclave2.png

215 KB
Loading

.gitbook/assets/enclave3.png

119 KB
Loading

.gitbook/assets/enclave4.png

100 KB
Loading

.gitbook/assets/enclave5.png

79.2 KB
Loading

.gitbook/assets/enclave6.png

141 KB
Loading

.gitbook/assets/enclave_example.png

74.9 KB
Loading

.gitbook/assets/eyal.pdf

8.94 MB
Binary file not shown.

.gitbook/assets/helloenclave.png

214 KB
Loading

.gitbook/assets/herbert.pdf

22.9 MB
Binary file not shown.

.gitbook/assets/ias.png

134 KB
Loading

.gitbook/assets/ittai.pdf

2.26 MB
Binary file not shown.

.gitbook/assets/lifecycle.png

50.6 KB
Loading

.gitbook/assets/local_attestation.png

68.2 KB
Loading
5.48 KB
Loading

.gitbook/assets/mark.pdf

4.96 MB
Binary file not shown.

.gitbook/assets/overview.png

67.3 KB
Loading

.gitbook/assets/ra.png

367 KB
Loading

.gitbook/assets/ra_flow.png

209 KB
Loading

.gitbook/assets/ra_summary.png

291 KB
Loading

.gitbook/assets/sealing_example.png

26.6 KB
Loading

.gitbook/assets/security-issues.pdf

7.94 MB
Binary file not shown.

.gitbook/assets/taesoo.pdf

6.56 MB
Binary file not shown.

.gitbook/assets/wallet.png

148 KB
Loading

.gitbook/assets/yossi.pdf

6.11 MB
Binary file not shown.

README.md

+33
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
layout: page
3+
title: SGX 101
4+
sidebar_sort_order: 1
5+
description: The very first place to study Intel SGX.
6+
---
7+
8+
# Home
9+
10+
## [SSLab](sslab.md)
11+
12+
SSLab represents the [Systems Software & Security Lab](https://gts3.org/) from Georgia Institute of Technology led by [Prof. Taesoo Kim](https://taesoo.kim/).
13+
14+
We have been actively working on SGX related research. These research projects can be broadly classified into three different categories: System Design, Defense, and Attack.
15+
16+
* Please take a look at our achievements on Attacks and Defenses for Intel SGX \(download link blow\). Demo videos can be viewed under [SGX Bootstrap/CCS17 Tutorial](sgx-bootstrap/ccs17-tutorial.md).
17+
18+
{% file src=".gitbook/assets/security-issues.pdf" caption="Attacks and Defenses for Intel SGX" %}
19+
20+
## [SGX Bootstrap](sgx-bootstrap/)
21+
22+
This is the very place to learn building your first application with Intel SGX in mind.
23+
24+
## [SGX Security](sgx-security/)
25+
26+
Intel SGX is not as secure as we thought.
27+
28+
## [Other Resources](resources.md)
29+
30+
Here you can look up various resources related to Intel SGX for reference.
31+
32+
## [About Us](about-us.md)
33+

SUMMARY.md

+25
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
# Table of contents
2+
3+
* [Home](README.md)
4+
* [SSLab](sslab.md)
5+
* [SGX Bootstrap](sgx-bootstrap/README.md)
6+
* [Overview](sgx-bootstrap/overview.md)
7+
* [Enclave](sgx-bootstrap/enclave/README.md)
8+
* [Communication between Architectural and Application Enclaves](sgx-bootstrap/enclave/interaction-between-pse-and-application-enclaves.md)
9+
* [Attestation](sgx-bootstrap/attestation/README.md)
10+
* [Inter-process Local Attestation](sgx-bootstrap/attestation/inter-process-local-attestation.md)
11+
* [Sealing](sgx-bootstrap/sealing.md)
12+
* [Real-world Example](sgx-bootstrap/real-world-example.md)
13+
* [CCS'17 Tutorial](sgx-bootstrap/ccs17-tutorial.md)
14+
* [Technion'18 Summer School Program](sgx-bootstrap/technion18-summer-school-program.md)
15+
* [SGX Security](sgx-security/README.md)
16+
* [Memory Corruption](sgx-security/memory-corruption.md)
17+
* [Uninitialized Memory](sgx-security/uninitialized-memory.md)
18+
* [Page-table-based Attacks](sgx-security/page-table-based-attack.md)
19+
* [Cache Attacks](sgx-security/cache-attack.md)
20+
* [Branch Shadowing](sgx-security/branch-shadowing.md)
21+
* [Row Hammer Attacks](sgx-security/row-hammer-attack.md)
22+
* [Speculative Execution Side Channels](sgx-security/speculative-side-channels.md)
23+
* [Other Resources](resources.md)
24+
* [About Us](about-us.md)
25+

about-us.md

+21
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
layout: page
3+
title: About Us
4+
sidebar_link: true
5+
sidebar_sort_order: 5
6+
---
7+
8+
# About Us
9+
10+
## Systems Software & Security Lab
11+
12+
We build practical systems with focuses on security, performance, robustness, or often just for fun. Our research projects have been published in top academic conferences, and have made great impacts on real programs, such as Firefox, Android, and the Linux kernel, that you might be using every day. If you are interested in hacking with us, please drop us an email via [[email protected]](mailto:[email protected]).
13+
14+
## Location
15+
16+
Klaus Advanced Computing Building, 266 Ferst Dr NW, Atlanta GA 30332-0765 [\(map\)](http://goo.gl/maps/1gbI8)
17+
18+
## More
19+
20+
For more information, please visit [gts3.org](https://gts3.org/).
21+

resources.md

+47
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
layout: page
3+
title: Resources
4+
sidebar_link: true
5+
sidebar_sort_order: 4
6+
description: A collection of study resources related to Intel SGX technology.
7+
---
8+
9+
# Other Resources
10+
11+
## From Intel
12+
13+
* [SGX developer guide from Intel](https://software.intel.com/en-us/documentation/sgx-developer-guide).
14+
* [This](http://tce.webee.eedev.technion.ac.il/wp-content/uploads/sites/8/2015/10/SGX-for-Technion-TCE.pdf) is a comprehensive introduction of SGX presented by Dror Caspi from Intel in Israel Institute of Technology.
15+
* [Introducing the Intel® Software Guard Extensions Tutorial Series](https://software.intel.com/en-us/articles/introducing-the-intel-software-guard-extensions-tutorial-series) is a set of tutorial blogs provided by Intel, which is focused on developing SGX applications for Windows platform.
16+
* [This blog form Intel](https://software.intel.com/en-us/blogs/2016/06/10/overview-of-intel-software-guard-extensions-instructions-and-data-structures) provides the overview of the instructions and data structures used in SGX. It's useful as a reference for technical terms.
17+
* [This blog from Intel](https://software.intel.com/en-us/articles/code-sample-intel-software-guard-extensions-remote-attestation-end-to-end-example) explains the Remote Attestation code example provided by Intel. Note that the code example from SGX SDK does not include the actual provisioning process with Intel Attestation Service.
18+
* [Innovative Technology for CPU Based Attestation and Sealing](https://software.intel.com/en-us/articles/innovative-technology-for-cpu-based-attestation-and-sealing) is the initial white paper for the attestation and sealing techniques now offered by SGX.
19+
* [Attestation Service for Intel® Software Guard Extensions \(Intel® SGX\): API Documentation](https://software.intel.com/sites/default/files/managed/7e/3b/ias-api-spec.pdf) provides the reference on how to interact with Intel Attestation Service using RESTful API.
20+
* [Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities](https://eprint.iacr.org/2007/194.pdf) is the initial paper from Intel that proposes Enhanced Privacy ID, the anonymous attestation scheme that is adopted by Intel Attestation Service.
21+
* [Integrating Remote Attestation with Transport Layer Security](https://arxiv.org/pdf/1801.05863.pdf) introcudes how to use remote attestation to achieve a TLS connection.
22+
* [This blog from Intel](https://eprint.iacr.org/2016/086.pdf) introduces the primitives associated with SGX sealing process. [More details](https://software.intel.com/en-us/node/702997) are also available from SGX developer guide.
23+
24+
## From Others
25+
26+
* [Intel SGX Explained](https://eprint.iacr.org/2016/086.pdf) is a comprehensive introduction to the technology, including the architecture background and the implementation. A must-have.
27+
* [Trust is in the Keys of the Beholder: Extending SGX Autonomy and Anonymity](https://www.idc.ac.il/en/schools/cs/research/Documents/jackson-msc-thesis.pdf) is the dissertation for MS degree by Alon Jackson. It offers an extensive description of the SGX ecosystem and evaluations of SGX security guarentees.
28+
* [SGX Secure Enclaves in Practice](https://www.blackhat.com/docs/us-16/materials/us-16-Aumasson-SGX-Secure-Enclaves-In-Practice-Security-And-Crypto-Review.pdf) is a review slides of the technology during BlackHat 2016. [This](https://github.com/kudelskisecurity/sgxfun/blob/master/paper/sgxpaper.md) is the corresponding review paper.
29+
* [Information Security – Theory vs. Reality](http://www.cs.tau.ac.il/~tromer/istvr1516-files/lecture10-trusted-platform-sgx.pdf) is another good intruduction slides from Tel Aviv University.
30+
* [Intel SGX Instructions in Enclave Initialization](https://insujang.github.io/2017-04-05/intel-sgx-instructions-in-enclave-initialization/) is a blog that explores and explains the implementation details of SGX enclave initialization very well.
31+
* [SGX attestation process](https://courses.cs.ut.ee/MTAT.07.022/2017_spring/uploads/Main/hiie-report-s16-17.pdf) is a report from University of Tartu that gives a good high level explanation of attestation process.
32+
* [Intel SGX Sealing](https://insujang.github.io/2017-10-09/intel-sgx-sealing/) is a blog that explains the details of SGX sealing process very well.
33+
34+
## Papers
35+
36+
Below are the best places to keep track of SGX related research papers for general purposes:
37+
38+
* [SGX Reading List](http://ina.kaist.ac.kr/~dongsuh/SGXReadingList.html) A well categorized SGX reading list.
39+
* [An up-to-date list of system papers related to Intel SGX](https://github.com/vschiavoni/sgx-papers)
40+
41+
## Useful
42+
43+
Other useful recources:
44+
45+
* [A list of hardwares that support Intel SGX](https://github.com/ayeks/SGX-hardware)
46+
* [Command-line tools to analyze SGX related binaries](https://github.com/kudelskisecurity/sgxfun)
47+

sgx-bootstrap/README.md

+31
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
layout: page
3+
title: SGX Bootstrap
4+
sidebar_link: true
5+
sidebar_sort_order: 3
6+
description: >-
7+
This is the very place to learn building your first application with Intel SGX
8+
in mind.
9+
---
10+
11+
# SGX Bootstrap
12+
13+
## Contents
14+
15+
### 1. [Overview](overview.md)
16+
17+
### 2. [Enclave](enclave/)
18+
19+
### 3. [Attestation](attestation/)
20+
21+
### 4. [Sealing](sealing.md)
22+
23+
### 5. [Real-world Example](real-world-example.md)
24+
25+
### 6. [Security Issues](../sgx-security/)
26+
27+
## Bonus
28+
29+
* A very good three-day security seminar from [Technion'18 summer school program](technion18-summer-school-program.md).
30+
* A must-read overall review of Intel SGX from CCS'17: [CCS17 Tutorial](ccs17-tutorial.md)
31+

0 commit comments

Comments
 (0)