156,59 €
173,99 €
-10% with code: EXTRA
Secure Processors Part II
Secure Processors Part II
156,59
173,99 €
  • We will send in 10–14 business days.
This manuscript is the second in a two part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The first part established the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves). This second part extends Part I's description of Intel's Software Guard Extensions (SGX), an available and…
  • Publisher:
  • ISBN-10: 1680833022
  • ISBN-13: 9781680833027
  • Format: 15.6 x 23.4 x 0.7 cm, softcover
  • Language: English
  • SAVE -10% with code: EXTRA

Secure Processors Part II (e-book) (used book) | bookbook.eu

Reviews

Description

This manuscript is the second in a two part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The first part established the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves). This second part extends Part I's description of Intel's Software Guard Extensions (SGX), an available and documented enclave-capable system, with a rigorous security analysis of SGX as a system for trusted remote computation. This part documents the authors' concerns over the shortcomings of SGX as a secure system and introduces the MIT Sanctum processor developed by the authors: a system designed to offer stronger security guarantees, lend itself better to analysis and formal verification, and offer a more straightforward and complete threat model than the Intel system, all with an equivalent programming model. This two part work advocates a principled, transparent, and wellscrutinized approach to system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead.

EXTRA 10 % discount with code: EXTRA

156,59
173,99 €
We will send in 10–14 business days.

The promotion ends in 19d.21:58:18

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,74 Book Euros!?
  • Author: Victor Costan
  • Publisher:
  • ISBN-10: 1680833022
  • ISBN-13: 9781680833027
  • Format: 15.6 x 23.4 x 0.7 cm, softcover
  • Language: English English

This manuscript is the second in a two part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The first part established the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves). This second part extends Part I's description of Intel's Software Guard Extensions (SGX), an available and documented enclave-capable system, with a rigorous security analysis of SGX as a system for trusted remote computation. This part documents the authors' concerns over the shortcomings of SGX as a secure system and introduces the MIT Sanctum processor developed by the authors: a system designed to offer stronger security guarantees, lend itself better to analysis and formal verification, and offer a more straightforward and complete threat model than the Intel system, all with an equivalent programming model. This two part work advocates a principled, transparent, and wellscrutinized approach to system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)