Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Simon P. Johnson is active.

Publication


Featured researches published by Simon P. Johnson.


hardware and architectural support for security and privacy | 2016

Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave

Frank McKeen; Ilya Alexandrovich; Ittai Anati; Dror Caspi; Simon P. Johnson; Rebekah Leslie-Hurd; Carlos V. Rozas

We introduce Intel® Software Guard Extensions (Intel® SGX) SGX2 which extends the SGX instruction set to include dynamic memory management support for enclaves. Intel® SGX is a subset of the Intel Architecture Instruction Set [1]. SGX1 allows an application developer to build a trusted environment and execute inside that space. However SGX1 imposes limitations regarding memory commitment and reuse of enclave memory. The software developer is required to allocate all memory at enclave instantiation. This paper describes new instructions and programming models to extend support for dynamic memory management inside an enclave.


international conference on information technology: new generations | 2011

SHA-512/256

Shay Gueron; Simon P. Johnson; Jesse Walker

With the emergence of pervasive 64 bit computing we observe that it is more cost effective to compute a SHA-512 than it is to compute a SHA-256 over a given size of data. We propose a standard way to use SHA-512 and truncate its output to 256 bits. For 64 bit architectures, this would yield a more efficient 256 bit hashing algorithm, than the current SHA-256. We call this method SHA-512/256. We also provide a method for reducing the size of the SHA-512 constants table that an implementation will need to store.


Innovations in Systems and Software Engineering | 2007

Infrastructure for Trusted Environment: In Search of a Solution

Claire Vishik; Simon P. Johnson; David Hoffman

Millions of PCs are currently sold equipped with a Trusted Platform Module, TPM, serving as a root of trust on the platform. Trusted Computing as an area of security has acquired significant visibility, and many new products and a growing number of research projects in areas ranging from virtualization to network security are based on Trusted Computing technologies and vision. In order to fully realize the vision of the Trusted Computing community, dedicated or compatible trust infrastructure for verification and attestation is required. Similar to other trust-enabling technologies, Trusted Computing needs an infrastructure that can verify the claim that a device is genuine and can be trusted to take part in a transaction, in which it is involved. Such an infrastructure will enable an environment where individuals can use the technology for protected transactions and potentially employ less risky authentication methods. This paper explores the role of infrastructure in Trusted Computing, starting with the discussion of the infrastructure’s importance and issues in trust establishment, followed by the description of the basics of Trusted Computing functionality requiring infrastructure support. We use examples of other trust enabling infrastructures, such as general-purpose PKI and infrastructure for Identity Federation to highlight common approaches. Finally, we touch upon economics of trust and intermediation, in order to define potential models for building enabling infrastructure for Trusted Computing.. While the paper doesn’t propose concrete solutions for the infrastructure problem in Trusted Computing, some possible avenues of building the necessary framework are outlined.


Archive | 2013

High performance interconnect

Robert J. Safranek; Robert G. Blankenship; Venkatraman Iyer; Jeff Willey; Robert Beers; Darren S. Jue; Arvind Kumar; Debendra Das Sharma; Jeffrey C. Swanson; Bahaa Fahim; Vedaraman Geetha; Aaron T. Spink; Fulvio Spagna; Rahul R. Shah; Sitaraman V. Iyer; William H. Nale; Abhishek Das; Simon P. Johnson; Yuvraj S. Dhillon; Yen-Cheng Liu; Raj K. Ramanujan; Robert A. Maddox; Herbert H. J. Hum; Ashish Gupta


Archive | 2007

Methods and apparatus for enforcing launch policies in processing systems

Willard M. Wiseman; Simon P. Johnson


Archive | 2013

Providing Geographic Protection To A System

Ned M. Smith; Simon P. Johnson; Steve Orrin; Willard M. Wiseman


Archive | 2013

Mutually assured data sharing between distrusting parties in a network environment

Vinay Phegade; Anand Rajan; Simon P. Johnson; Vincent R. Scarlata; Carlos V. Rozas; Nikhil M. Deshpande


Archive | 2013

Paging in secure enclaves

Francis X. McKeen; Michael A. Goldsmith; Barry E. Huntley; Simon P. Johnson; Rebekah Leslie-Hurd; Carlos V. Rozas; Uday Savagaonkar; Vincent R. Scarlata; Vedvyas Shanbhogue; Wesley H. Smith; Ittai Anati; Ilya Alexandrovich; Alex Berenzon; Gilbert Neiger


Archive | 2015

PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO SUPPORT LIVE MIGRATION OF PROTECTED CONTAINERS

Carlos V. Rozas; Mona Vij; Rebekah Leslie-Hurd; Krystof C. Zmudzinski; Somnath Chakrabarti; Francis X. McKeen; Vincent R. Scarlata; Simon P. Johnson; Ilya Alexandrovich; Gilbert Neiger; Vedvyas Shanbhogue; Ittai Anati


Archive | 2013

Logging in secure enclaves

Francis X. McKeen; Michael A. Goldsmith; Barrey E. Huntley; Simon P. Johnson; Rebekah Leslie-Hurd; Carlos V. Rozas; Uday Savagaonkar; Vincent R. Scarlata; Vedvyas Shanbhogue; Wesley H. Smith; Gilbert Neiger

Researchain Logo
Decentralizing Knowledge