×

Flicker

swMATH ID: 22637
Software Authors: McCune, J. M.; Parno, B. J.; Perrig, A.; Reiter, M. K.; Isozaki, H.
Description: Flicker: An execution infrastructure for TCB minimization. We present Flicker, an infrastructure for executing security-sensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide meaningful, fine-grained attestation of the code executed (as well as its inputs and outputs) to a remote party. Flicker guarantees these properties even if the BIOS, OS and DMA-enabled devices are all malicious. Flicker leverages new commodity processors from AMD and Intel and does not require a new OS or VMM. We demonstrate a full implementation of Flicker on an AMD platform and describe our development environment for simplifying the construction of Flicker-enabled code.
Homepage: https://dl.acm.org/citation.cfm?id=1352625
Keywords: Trusted Computing; Late Launch; Secure Execution; TCB Minimization; AMD platform; ACM Digital Library
Related Software: Rocket Chip; GitHub; SGX; Boogie; Kami; Pilsner; Toolchain; Haskell; ML; Coq; AddressSanitizer; SWATT; ProVerif; Sancus; Quin; PyEmu; DynInst; Jif
Cited in: 7 Documents

Standard Articles

1 Publication describing the Software Year
Flicker: an execution infrastructure for tcb minimization Link
J.M. McCune, B.J. Parno, A. Perrig, M.K. Reiter, H. Isozaki
2008

Citations by Year