Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ilya Alexandrovich is active.

Publication


Featured researches published by Ilya Alexandrovich.


hardware and architectural support for security and privacy | 2013

Innovative instructions and software model for isolated execution

Frank McKeen; Ilya Alexandrovich; Alex Berenzon; Carlos V. Rozas; Hisham Shafi; Vedvyas Shanbhogue; Uday Savagaonkar

For years the PC community has struggled to provide secure solutions on open platforms. Intel has developed innovative new technology to enable SW developers to develop and deploy secure applications on open platforms. The technology enables applications to execute with confidentiality and integrity in the native OS environment. It does this by providing ISA extensions for generating hardware enforceable containers at a granularity determined by the developer. These containers while opaque to the operating system are managed by the OS. This paper analyzes the threats and attacks to applications. It then describes the ISA extension for generating a HW based container. Finally it describes the programming model of this container.


hardware and architectural support for security and privacy | 2016

Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave

Frank McKeen; Ilya Alexandrovich; Ittai Anati; Dror Caspi; Simon P. Johnson; Rebekah Leslie-Hurd; Carlos V. Rozas

We introduce Intel® Software Guard Extensions (Intel® SGX) SGX2 which extends the SGX instruction set to include dynamic memory management support for enclaves. Intel® SGX is a subset of the Intel Architecture Instruction Set [1]. SGX1 allows an application developer to build a trusted environment and execute inside that space. However SGX1 imposes limitations regarding memory commitment and reuse of enclave memory. The software developer is required to allocate all memory at enclave instantiation. This paper describes new instructions and programming models to extend support for dynamic memory management inside an enclave.


hardware and architectural support for security and privacy | 2017

Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment

Somnath Chakrabarti; Rebekah Leslie-Hurd; Mona Vij; Frank McKeen; Carlos V. Rozas; Dror Caspi; Ilya Alexandrovich; Ittai Anati

As workloads and data move to the cloud, it is essential that software writers are able to protect their applications from untrusted hardware, systems software, and co-tenants. Intel® Software Guard Extensions (SGX) enables a new mode of execution that is protected from attacks in such an environment with strong confidentiality, integrity, and replay protection guarantees. Though SGX supports memory oversubscription via paging, virtualizing the protected memory presents a significant challenge to Virtual Machine Monitor (VMM) writers and comes with a high performance overhead. This paper introduces SGX Oversubscription Extensions that add additional instructions and virtualization support to the SGX architecture so that cloud service providers can oversubscribe secure memory in a less complex and more performant manner.


Archive | 2014

Secure memory repartitioning

Siddhartha Chhabra; Uday Savagaonkar; Michael A. Goldsmith; Simon Johnson; Rebekah Leslie-Hurd; Francis X. McKeen; Gilbert Neiger; Raghunandan Makaram; Carlos V. Rozas; Amy L. Santoni; Vincent R. Scarlata; Vedvyas Shanbhogue; Wesley H. Smith; Ittai Anati; Ilya Alexandrovich


Archive | 2016

Instructions and logic to provide advanced paging capabilities for secure enclave page caches

Carlos V. Rozas; Ilya Alexandrovich; Ittai Anati; Alex Berenzon; Michael A. Goldsmith; Barry E. Huntley; Anton Ivanov; Simon Johnson; Rebekah Leslie-Hurd; Francis X. McKeen; Gilbert Neiger; Rinat Rappoport; Scott Dion Rodgers; Uday Savagaonkar; Vincent R. Scarlata; Vedvyas Shanbhogue; Wesley H. Smith; William Colin Wood


Archive | 2013

Memory management in secure enclaves

Rebekah Leslie-Hurd; Carlos V. Rozas; Vincent R. Scarlata; Simon Johnson; Uday Savagaonkar; Barry E. Huntley; Vedvyas Shanbhogue; Ittai Anati; Francis X. McKeen; Michael A. Goldsmith; Ilya Alexandrovich; Alex Berenzon; Wesley H. Smith; Gilbert Neiger


Archive | 2013

Paging in secure enclaves

Francis X. McKeen; Michael A. Goldsmith; Barry E. Huntley; Simon P. Johnson; Rebekah Leslie-Hurd; Carlos V. Rozas; Uday Savagaonkar; Vincent R. Scarlata; Vedvyas Shanbhogue; Wesley H. Smith; Ittai Anati; Ilya Alexandrovich; Alex Berenzon; Gilbert Neiger


Archive | 2015

PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO SUPPORT LIVE MIGRATION OF PROTECTED CONTAINERS

Carlos V. Rozas; Mona Vij; Rebekah Leslie-Hurd; Krystof C. Zmudzinski; Somnath Chakrabarti; Francis X. McKeen; Vincent R. Scarlata; Simon P. Johnson; Ilya Alexandrovich; Gilbert Neiger; Vedvyas Shanbhogue; Ittai Anati


Archive | 2013

MODIFYING MEMORY PERMISSIONS IN A SECURE PROCESSING ENVIRONMENT

Rebekah Leslie-Hurd; Ilya Alexandrovich; Ittai Anati; Alex Berenzon; Michael A. Goldsmith; Simon Johnson; Francis X. McKeen; Carlos V. Rozas; Uday Savagaonkar; Vincent R. Scarlata; Vedvyas Shanbhogue; Wesley H. Smith


Archive | 2017

Instructions and logic to suspend/resume migration of enclaves in a secure enclave page cache

Carlos V. Rozas; Ilya Alexandrovich; Gilbert Neiger; Francis X. McKeen; Ittai Anati; Vedvyas Shanbhogue; Vij Mona; Leslie-Hurd M. Rebekah; Zmudzinski Krystof; Chakrabarti Somnath; Scarlata R. Vincent; Johnson P. Simon

Researchain Logo
Decentralizing Knowledge