[Cryptography] Intel SGX: Augean stables piled higher & deeper?

Henry Baker hbaker1 at pipeline.com
Sun May 17 22:13:53 EDT 2015

Perhaps it's just me, or perhaps it's just the lecturer, but this Intel "SGX" looks like BS piled higher & deeper -- i.e., building better places for hackers (including nation-states) to hide their malware, and still more complexity that hasn't been (can't be ?) proven correct.


Intel Software Guard Extensions 
Innovative Instructions for Next Generation Isolated Execution 

Frank McKeen 
Intel Corporation 

About the talk: 

This talk describes Intel's Software Guard Extensions (SGX) technology.  SGX provides new tools and hardware facilities to software developers to protect an application's secrets.  In today's computing environment the ability to keep a secret requires the integrity of millions of line of software in the OS, VMM, and application.  SGX creates a trusted environment called an enclave inside the application.  An enclave provides an ability to protect the secret without dependency on the integrity of any other code.  The talk will describe the programming environment, instruction set, and hardware facilities which make up the SGX architecture.


Download the de-animated slides for this talk in PDF format.



Join the live presentation. Wednesday April 15, 4:15-5:30.  Requires Microsoft Windows Media player. 
View video by lecture sequence. Spring 2015 series only, HTML5. Available after 8PM on the days of the lecture.

View Video on YouTube.

About the speaker: 

Frank McKeen: Principal Engineer, Security Research Lab, Intel, Portland OR, USA. 

Frank is the inventor of the SGX architecture and leader of the SGX architecture research team. He has previous experience in microprocessor design, security concepts, and trusted computing. He received a BSEE from Northeastern University and is a member of the IEEE.

More information about the cryptography mailing list