Visiting Faculty Talk

Friday, March 3, 2017 - 10:00am

Location:

8102 Gates Hillman Center

Speaker:

RYAN RILEY, Associate Professor of Computer Science https://vsecurity.info/

For More Information, Contact:

khibner@cs.cmu.edu

When an operating system or hypervisor is compromised, then the attacker can easily get access to the memory of any lower privileged layers. This means, for example, that an attacker who exploits a security flaw in the OS can compromise private data stored in the processes of other users on the system, even if those processes don’t have security flaws themselves.  In this talk, I will discuss Iso-X, a hardware-supported framework that provides isolation for security-critical pieces of an application such that they can execute securely even in the presence of compromised system software. Isolation in Iso-X is achieved by creating and dynamically managing compartments to host critical fragments of code and associated data. Iso-X provides fine-grained isolation at the memory-page level, flexible allocation of memory, and a low-complexity, hardware-only trusted computing base.With the recent release of Intel’s Software Guard Extensions (SGX), isolated execution is receiving renewed interest from the research community. The high-level principals behind Iso-X and SGX are the same, meaning that the information presented in this talk will familiarize the listeners with the concepts they need in order to understand isolated execution in general.—Dr. Ryan Riley is an Associate Professor of Computer Science at Qatar University. He received his Ph.D from Purdue University in 2009 under the direction of Dongyan Xu and Xuxian Jiang. Although his first love is teaching, he also enjoys research in a variety of areas related to operating systems, computer architecture, and most of all security. You can find more information about him at his website.Facuty Host: Guy BlellochQatar

Keywords:

Visiting Faculty Talk