Skip to main content

Showing 1–1 of 1 results for author: Schuster, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:1712.07882  [pdf, other

    cs.CR

    The Pyramid Scheme: Oblivious RAM for Trusted Processors

    Authors: Manuel Costa, Lawrence Esswood, Olga Ohrimenko, Felix Schuster, Sameer Wagh

    Abstract: Modern processors, e.g., Intel SGX, allow applications to isolate secret code and data in encrypted memory regions called enclaves. While encryption effectively hides the contents of memory, the sequence of address references issued by the secret code leaks information. This is a serious problem because these leaks can easily break the confidentiality guarantees of enclaves. In this paper, we ex… ▽ More

    Submitted 21 December, 2017; originally announced December 2017.