C
Carlos V. Rozas
Researcher at Intel
Publications - 112
Citations - 4543
Carlos V. Rozas is an academic researcher from Intel. The author has contributed to research in topics: Execution unit & Encryption. The author has an hindex of 29, co-authored 112 publications receiving 4149 citations. Previous affiliations of Carlos V. Rozas include Association for Computing Machinery & Durham University.
Papers
More filters
Proceedings ArticleDOI
Innovative instructions and software model for isolated execution
Frank Mckeen,Ilya Alexandrovich,Alex Berenzon,Carlos V. Rozas,Hisham Shafi,Vedvyas Shanbhogue,Uday R. Savagaonkar +6 more
TL;DR: This paper analyzes the threats and attacks to applications, then describes the ISA extension for generating a HW based container, and describes the programming model of this container.
Patent
Method for securely distributing a conditional use private key to a trusted entity on a remote system
TL;DR: Secure distribution of a private key to a user's application program (also called a "trusted player" such as a DVD player or CD-ROM player) with conditional access based on verification of the trusted player's integrity and authenticity is provided in this paper.
Proceedings ArticleDOI
CATalyst: Defeating last-level cache side channel attacks in cloud computing
TL;DR: CATalyst, a pseudo-locking mechanism which uses CAT to partition the LLC into a hybrid hardware-software managed cache, is presented, and it is shown that LLC side channel attacks can be defeated.
Proceedings ArticleDOI
Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave
Frank Mckeen,Ilya Alexandrovich,Ittai Anati,Caspi Dror,Simon P. Johnson,Rebekah M. Leslie-Hurd,Carlos V. Rozas +6 more
TL;DR: New instructions and programming models to extend support for dynamic memory management inside an enclave are described.
Patent
Technique for supporting multiple secure enclaves
TL;DR: Secure enclaves as discussed by the authors is a technique to enable secure application and data integrity within a computer system, in which one or more secure enclaves are established in which an application or data may be stored and executed.