Using innovative instructions to create trustworthy software solutions

HASP '13: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy(2013)

引用 532|浏览3
暂无评分
摘要
Software developers face a number of challenges when creating applications that attempt to keep important data confidential. Even with diligent attention paid to correct software design and implementation practices, secrets can still be exposed through a single flaw in any of the privileged code on the platform, code which may have been written by thousands of developers from hundreds of organizations throughout the world. Intel is developing innovative security technology which provides the ability for software developers to maintain control of the security of sensitive code and data by creating trusted domains within applications to protect critical information during execution and at rest. This paper will describe how this technology has been effectively used in lab exercises to protect private information in applications including enterprise rights management, video chat, trusted financial transactions, and others. Examples will include both protection of local processing and the establishment of secure communication with cloud services. It will illustrate useful software design patterns that can be followed to create many additional types of trusted software solutions.
更多
查看译文
关键词
trustworthy software solution,innovative security technology,private information,software solution,software developer,critical information,important data,privileged code,useful software design pattern,software design,innovative instruction,sensitive code,brute force,resilience
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要