|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Minimal TCB Code Execution
If you have a question about this talk, please contact Andrew Lewis.
We present Flicker, an architecture that allows code to execute in complete isolation from other software while trusting only a tiny software base that is orders of magnitude smaller than even minimalist virtual machine monitors. Flicker can also provide fine-grained attestation of the code executed (as well as its inputs and outputs) to a remote party. Our technique enables more meaningful attestation than previous proposals, since only measurements of the security-sensitive portions of an application need to be included. We achieve these guarantees by leveraging hardware support provided by commodity processors from AMD and Intel that are shipping today, and without requiring a new operating system.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsMarket Square – The Cambridge Business & Society Interdisciplinary Research Group Cambridge Environment Inference Group Summary
Other talksLunchtime Talks THE DRILLERS DON’T LIKE GETTING WET or WHY THE LAUNDRY ROOM KEEPS GETTING FLOODED : Water up to surprisingly high levels around the legs of large floating oil rigs Alterations of brain function in pre-dementia Alzheimer’s disease: implications for early diagnosis Contentious politics and public services in the European Union 2D or not 2D? Two-dimensional nanostructures for sensing and solar energy conversion Cardiovascular Development: Insights into Regeneration