swMATH ID: |
22637
|
Software Authors: |
McCune, J. M.; Parno, B. J.; Perrig, A.; Reiter, M. K.; Isozaki, H.
|
Description: |
Flicker: An execution infrastructure for TCB minimization. We present Flicker, an infrastructure for executing security-sensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide meaningful, fine-grained attestation of the code executed (as well as its inputs and outputs) to a remote party. Flicker guarantees these properties even if the BIOS, OS and DMA-enabled devices are all malicious. Flicker leverages new commodity processors from AMD and Intel and does not require a new OS or VMM. We demonstrate a full implementation of Flicker on an AMD platform and describe our development environment for simplifying the construction of Flicker-enabled code. |
Homepage: |
https://dl.acm.org/citation.cfm?id=1352625
|
Keywords: |
Trusted Computing;
Late Launch;
Secure Execution;
TCB Minimization;
AMD platform;
ACM Digital Library
|
Related Software: |
Rocket Chip;
GitHub;
SGX;
Boogie;
Kami;
Pilsner;
Toolchain;
Haskell;
ML;
Coq;
AddressSanitizer;
SWATT;
ProVerif;
Sancus;
Quin;
PyEmu;
DynInst;
Jif
|
Cited in: |
7 Documents
|