From Wikipedia, the free encyclopedia



Users

Additions

  1. 2015-10-14 16:46:32 (UTC): User A5b t • c • dc • l • ef • b • bl; (19231) to Software Guard Extensions ( | talk | history | links | watch | logs) ( diff  !top) - Link: theinvisiblethings.blogspot.ru/2013/08/thoughts-on-intels-upcoming-software.html ( R/ Xmeta/ L)
    Other links: www.virusbtn.com/virusbulletin/archive/2014/01/vb201401-SGX (19231, 202, 3, 2- R/ X/ L) theinvisiblethings.blogspot.ru/2013/08/thoughts-on-intels-upcoming-software.html (19231, 3, 1, 1- R/ X/ L) web.cs.wpi.edu/~guttman/cs557_website/papers/trusted_computing/sgx1.pdf (19231, 101, 1, 1- R/ X/ L) software.intel.com/sites/default/files/332680-002.pdf (19231, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/3e/b9/SF15_ISGC003_81_SGX_DL_100_small.pdf (19231, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/48/88/329298-002.pdf (19231, -1, X, X- R/ X/ L) software.intel.com/en-us/isa-extensions/intel-sgx (19231, -1, X, X- R/ X/ L) tc.gtisc.gatech.edu/bss/2014/l/final/pjain43.pdf (19231, 16, 2, 1- R/ X/ L) tc.gtisc.gatech.edu/bss/2014/l/final/pjain43.pdf (19231, 16, 2, 1- R/ X/ L) software.intel.com/sites/default/files/managed/07/b7/319433-023.pdf#page=36 (19231, -1, X, X- R/ X/ L)
  2. 2018-04-17 13:08:54 (UTC): w:uk:User:The Iron Addict ( t - c; 3754) to w:uk:Повітряний проміжок (мережі передачі даних) ( diff  !top) - Link: theinvisiblethings.blogspot.ru/2011/06/usb-security-challenges.html ( R/ Xmeta/ L)
    Other links: www.schneier.com/blog/archives/2013/10/air_gaps.html (3754, 1214, X, X- R/ X/ L) theinvisiblethings.blogspot.ru/2011/06/usb-security-challenges.html (3754, 3, 1, 1- R/ X/ L)
  3. 2019-04-24 16:37:56 (UTC): w:pt:User:Marcelopge ( t - c; 31) to w:pt:Software Guard Extensions ( diff  top) - Link: theinvisiblethings.blogspot.ru/2013/08/thoughts-on-intels-upcoming-software.html ( R/ Xmeta/ L- still there)
    Other links: cdn2.hubspot.net/hubfs/1761386/security-of-intelsgx-key-protection-data-privacy-apps.pdf (31, 391, 1, 0- R/ X/ L) github.com/wolfSSL/wolfssl (31, -1, X, X- R/ X/ L) eprint.iacr.org/2016/086.pdf (31, 2186, X, X- R/ X/ L) www.virusbtn.com/virusbulletin/archive/2014/01/vb201401-SGX (31, 202, 1, 1- R/ X/ L) theinvisiblethings.blogspot.ru/2013/08/thoughts-on-intels-upcoming-software.html (31, 3, 1, 1- R/ X/ L) web.cs.wpi.edu/~guttman/cs557_website/papers/trusted_computing/sgx1.pdf (31, 101, 1, 1- R/ X/ L) software.intel.com/sites/default/files/332680-002.pdf (31, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/3e/b9/SF15_ISGC003_81_SGX_DL_100_small.pdf (31, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/48/88/329298-002.pdf (31, -1, X, X- R/ X/ L) software.intel.com/en-us/isa-extensions/intel-sgx (31, -1, X, X- R/ X/ L) arstechnica.com/gadgets/2019/02/researchers-use-intel-sgx-to-put-malware-beyond-the-reach-of-antivirus-software/ (31, -1, X, X- R/ X/ L) arstechnica.com/gadgets/2018/07/new-spectre-like-attack-uses-speculative-execution-to-overflow-buffers/ (31, -1, X, X- R/ X/ L) github.com/lsds/spectre-attack-sgx (31, -1, X, X- R/ X/ L) www.usenix.org/system/files/conference/usenixsecurity17/sec17-gruss.pdf (31, 1437, X, X- R/ X/ L) www.theregister.co.uk/2017/03/07/eggheads_slip_a_note_under_intels_door_sgx_can_leak_crypto_keys/ (31, -1, X, X- R/ X/ L) www.wolfssl.com/wolfssl-at-idf/ (31, 387, 1, 0- R/ X/ L) github.com/sslab-gatech/opensgx (31, -1, X, X- R/ X/ L) tc.gtisc.gatech.edu/bss/2014/l/final/pjain43.pdf (31, 16, 1, 1- R/ X/ L) software.intel.com/en-us/articles/properly-detecting-intel-software-guard-extensions-in-your-applications (31, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/07/b7/319433-023.pdf#page=36 (31, -1, X, X- R/ X/ L) software.intel.com/en-us/sgx/details (31, -1, X, X- R/ X/ L) it.slashdot.org/story/19/02/12/222254/researchers-use-intel-sgx-to-put-malware-beyond-the-reach-of-antivirus-software?sbsrc=developers (31, 137, 1, 1- R/ X/ L) software.intel.com/en-us/articles/properly-detecting-intel-software-guard-extensions-in-your-applications (31, -1, X, X- R/ X/ L) software.intel.com/en-us/blogs/2013/09/26/protecting-application-secrets-with-intel-sgx (31, -1, X, X- R/ X/ L)
  • Displayed all 3 additions.
From Wikipedia, the free encyclopedia



Users

Additions

  1. 2015-10-14 16:46:32 (UTC): User A5b t • c • dc • l • ef • b • bl; (19231) to Software Guard Extensions ( | talk | history | links | watch | logs) ( diff  !top) - Link: theinvisiblethings.blogspot.ru/2013/08/thoughts-on-intels-upcoming-software.html ( R/ Xmeta/ L)
    Other links: www.virusbtn.com/virusbulletin/archive/2014/01/vb201401-SGX (19231, 202, 3, 2- R/ X/ L) theinvisiblethings.blogspot.ru/2013/08/thoughts-on-intels-upcoming-software.html (19231, 3, 1, 1- R/ X/ L) web.cs.wpi.edu/~guttman/cs557_website/papers/trusted_computing/sgx1.pdf (19231, 101, 1, 1- R/ X/ L) software.intel.com/sites/default/files/332680-002.pdf (19231, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/3e/b9/SF15_ISGC003_81_SGX_DL_100_small.pdf (19231, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/48/88/329298-002.pdf (19231, -1, X, X- R/ X/ L) software.intel.com/en-us/isa-extensions/intel-sgx (19231, -1, X, X- R/ X/ L) tc.gtisc.gatech.edu/bss/2014/l/final/pjain43.pdf (19231, 16, 2, 1- R/ X/ L) tc.gtisc.gatech.edu/bss/2014/l/final/pjain43.pdf (19231, 16, 2, 1- R/ X/ L) software.intel.com/sites/default/files/managed/07/b7/319433-023.pdf#page=36 (19231, -1, X, X- R/ X/ L)
  2. 2018-04-17 13:08:54 (UTC): w:uk:User:The Iron Addict ( t - c; 3754) to w:uk:Повітряний проміжок (мережі передачі даних) ( diff  !top) - Link: theinvisiblethings.blogspot.ru/2011/06/usb-security-challenges.html ( R/ Xmeta/ L)
    Other links: www.schneier.com/blog/archives/2013/10/air_gaps.html (3754, 1214, X, X- R/ X/ L) theinvisiblethings.blogspot.ru/2011/06/usb-security-challenges.html (3754, 3, 1, 1- R/ X/ L)
  3. 2019-04-24 16:37:56 (UTC): w:pt:User:Marcelopge ( t - c; 31) to w:pt:Software Guard Extensions ( diff  top) - Link: theinvisiblethings.blogspot.ru/2013/08/thoughts-on-intels-upcoming-software.html ( R/ Xmeta/ L- still there)
    Other links: cdn2.hubspot.net/hubfs/1761386/security-of-intelsgx-key-protection-data-privacy-apps.pdf (31, 391, 1, 0- R/ X/ L) github.com/wolfSSL/wolfssl (31, -1, X, X- R/ X/ L) eprint.iacr.org/2016/086.pdf (31, 2186, X, X- R/ X/ L) www.virusbtn.com/virusbulletin/archive/2014/01/vb201401-SGX (31, 202, 1, 1- R/ X/ L) theinvisiblethings.blogspot.ru/2013/08/thoughts-on-intels-upcoming-software.html (31, 3, 1, 1- R/ X/ L) web.cs.wpi.edu/~guttman/cs557_website/papers/trusted_computing/sgx1.pdf (31, 101, 1, 1- R/ X/ L) software.intel.com/sites/default/files/332680-002.pdf (31, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/3e/b9/SF15_ISGC003_81_SGX_DL_100_small.pdf (31, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/48/88/329298-002.pdf (31, -1, X, X- R/ X/ L) software.intel.com/en-us/isa-extensions/intel-sgx (31, -1, X, X- R/ X/ L) arstechnica.com/gadgets/2019/02/researchers-use-intel-sgx-to-put-malware-beyond-the-reach-of-antivirus-software/ (31, -1, X, X- R/ X/ L) arstechnica.com/gadgets/2018/07/new-spectre-like-attack-uses-speculative-execution-to-overflow-buffers/ (31, -1, X, X- R/ X/ L) github.com/lsds/spectre-attack-sgx (31, -1, X, X- R/ X/ L) www.usenix.org/system/files/conference/usenixsecurity17/sec17-gruss.pdf (31, 1437, X, X- R/ X/ L) www.theregister.co.uk/2017/03/07/eggheads_slip_a_note_under_intels_door_sgx_can_leak_crypto_keys/ (31, -1, X, X- R/ X/ L) www.wolfssl.com/wolfssl-at-idf/ (31, 387, 1, 0- R/ X/ L) github.com/sslab-gatech/opensgx (31, -1, X, X- R/ X/ L) tc.gtisc.gatech.edu/bss/2014/l/final/pjain43.pdf (31, 16, 1, 1- R/ X/ L) software.intel.com/en-us/articles/properly-detecting-intel-software-guard-extensions-in-your-applications (31, -1, X, X- R/ X/ L) software.intel.com/sites/default/files/managed/07/b7/319433-023.pdf#page=36 (31, -1, X, X- R/ X/ L) software.intel.com/en-us/sgx/details (31, -1, X, X- R/ X/ L) it.slashdot.org/story/19/02/12/222254/researchers-use-intel-sgx-to-put-malware-beyond-the-reach-of-antivirus-software?sbsrc=developers (31, 137, 1, 1- R/ X/ L) software.intel.com/en-us/articles/properly-detecting-intel-software-guard-extensions-in-your-applications (31, -1, X, X- R/ X/ L) software.intel.com/en-us/blogs/2013/09/26/protecting-application-secrets-with-intel-sgx (31, -1, X, X- R/ X/ L)
  • Displayed all 3 additions.

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook