Top Banner
Hi, everyone! Thank you very much for coming! My name is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory, in collaboration with Ilia Lebedev and Prof. Srini Devadas. 1
61

Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Jun 08, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Hi,everyone!Thankyouverymuchforcoming!

My nameisVictorCostan,andIamheretotalkaboutSanctum.

ThisworkwasdoneatMIT’sComputerScienceandAILaboratory,incollaborationwithIliaLebedevandProf.SriniDevadas.

1

Page 2: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Sanctum’sgoalistrustedcomputing.Inthisrespect,ourworkbelongstothesamefamilyasTPM,TXT,SGX,andTrustZone.However,Sanctumgivesyouunprecedentedprotectionandunprecedentedcontroloveryourcomputer.

MostofSanctum’ssecuritylogicisinsoftware,notinhardwareormicrocode.Oursoftwarecanbeinspectedbythecomputer’sowner,andisamenabletoformalverification.Mostofthissoftwarecanevenbereplacedbythecomputer’sowner.Thisisanunprecedentedlevelofcontrol.

Sanctum’shardwareextensionscanbeappliedtoanyreasonablymodernRISCprocessorcore.IncombinationwithSanctum’ssoftware,thehardwareextensionsprotectagainstanypracticalsoftwareattacks,includingcachetimingattacks.Thisisanunprecedentedlevelofprotection.

OurprototypetargetstheRISC-Varchitecture,andshowsthatSanctumincursacceptableperformanceoverheads.

2

Page 3: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Togetthingsstarted,letmegiveyouaquickoverview oftrustedcomputing,whichistheproblemthatwe’retryingtosolve.

3

Page 4: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Sothere’sthisdream,calledsecureremotecomputation.Inthisdream,youcanpackageyourcodeanddataintoabundle,sendthatbundleovertoaremotecomputer,havethecomputerrunyoursoftware,andgettheresultsback.Thethingis,youdon’townthatremotecomputer,soyourelyonmagictoprotectyourcodeanddatafromthecomputer’sowner,andfromtheothersoftwarethatmightberunningonthatcomputer.

Unfortunately,thisisjustadream.Theclosestthingwe’vegotisfullyhomomorphicencryption,andthat’snowherenearlypractical.

4

Page 5: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Fortunately,wecanapproximatethatdream,ifwe’rewillingtotrustapieceofhardwareontheremote computer.Thetrusted hardwareestablishesasecurecontainerontheremotecomputer,whichprotectsourcomputationanddatafromuntrustedthirdparties.So,ourcomputationissafe,aslongasweonlysendittotrustedhardware.

5

Page 6: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

So,wehaveto makesurethatweonlytalktotrustedhardware.We can usesoftwareattestationforthis.

6

Page 7: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Veryquickly,softwareattestationmeansthatthereisahardwaremanufacturerthatwetrust,andthemanufactureractsasacertificateauthorityinaPKI.

7

Page 8: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Eachpieceoftrustedhardwarehas anattestationkey,andthemanufacturerissuesanendorsementcertificateforthepublicattestationkey.Whenweseethatcertificate,weknowthatwecantrustsignaturesissuedbythedevice’sprivateattestationkey,whichisstoredinsecurehardware.

8

Page 9: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Now,whenwewanttosendourcodeovertotheremotecomputer,wewillfirstaskthe trustedhardwaretocreateasecurecontainerforus,andwewillsendachallengemessagetothatsecurecontainer.

9

Page 10: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Ourloader codeinthecontainerwillreceivethechallengemessageandcomputearesponsemessage,andthenitwillaskthetrustedhardwaretoproduceanattestationsignature.Theattestationsignaturecoversthemessageproducedbyourcontainer,aswellasameasurementofthesecurecontainer’sinitialstate.Whenwevalidatetheattestationsignature,weareassuredthatwearetalkingtoasecurecontainerthatisinitializedaccordingtoourinstructions,andhostedbyhardwarewetrust.

10

Page 11: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

WhatI’vesaidso farappliestoalltrustedcomputingsolutions.Thesesolutionsdifferbytheamountofsoftwarethatgoesintoasecurecontainer,bythesecurityguaranteesofferedtothecontainer,bythetrustedhardwareandsoftwareneededtoenforcethesystem’ssecurity,andbythedetailsoftheirsoftwareattestationprocess.

TherestofthistalkwillhopefullyclarifywhereSanctumstandsonalltheseaspects.

11

Page 12: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

12

Page 13: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Oursecurecontainersarecalledenclaves,andtheyare conceptuallyextensionsofapplicationprocesses.Enclavesrunatthelowestpossibleprivilegelevel -- thisisknownasring3inx86,orusermodeanywhereelse.Thismeansenclavescannotcompromisethehostcomputer’sOSorhypervisor.Sowedon’tneedtoworryaboutrestrictingenclaves–thesamemechanismsusedtopoliceuserprocesseswillworkforenclaves.

13

Page 14: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Enclavescanaccessthememoryspaceoftheirhostapplications,buttheycannotperformsyscalls directly.Thisisbecausewedon’ttrusttheOSkerneltonotdamagetheenclave’sexecutioncontextbeforereturningfromthesyscall.Toworkaroundthis,theenclavemustrelyonitshostapplicationtoproxysyscalls totheOS.Thesyscall proxying requirescodeintheenclave,andinthehostapplication.Weexpectthiscodetobecomeapartoftheruntimelibrary.Forexample,ifyourenclavesoftwareuseslibc,you’dsimplyuseanenclave-awarelibc thatproxiesallthesyscallsitmakes.

14

Page 15: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Ourenclavesaren’tnew.SGX’senclavesoperateinaverysimilarway.Somethingthat_is_new,andthatI’mreallyproudof– thevastmajorityoursecuritylogicisexpressedinsoftware.Thisisn’tfirmwareormicrocode.It’snormalsoftwarethatexecutesusingtheprocessor’sstandardexecutionfacilities.It’ssoftwarethatthecomputer’sownercaninspectandanalyze.

15

Page 16: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Thedownsideofnotrelyingonfirmwareormicrocodeisthatoursoftwareisnotautomaticallyisolatedfromrestofthecoderunningonthemachine,andwemayberunningalongsideamalicioushypervisororoperatingsystem.Inordertobeabletoprovideanysortofmeaningfulsecurityguarantees,weassumethatoursoftwarerunsatahigherprivilegelevelthananythingelse.TheRISC-Varchitectureconvenientlyincludesamachinelevel,andourprototypetakesadvantageoftheexistenceofthismachinelevel.

Weruntwopiecesofsoftwareatthemachinelevel.

16

Page 17: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Thecentralpieceofsoftwareisthesecuritymonitor,whichenforcesSanctum’ssecuritypolicies.Oursecuritymonitoristiny,soitcanbeamenabletoformalverification.Thekeytokeepingitsosmallisthatwedon’tmakeanyresourceallocationdecisionsinthemonitor.Theoperatingsystemgetstomakeallthedecisions,justliketoday.InSanctum,theOSmustsubmititsdecisionstothesecuritymonitorinordertohavethemapplied.Thisway,wecanverifytheOS’decisionsinthemonitor,andwecanrejectdecisionsthatwouldbreakSanctum’ssecurityguarantees.

17

Page 18: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Theotherpieceofsoftwarethatrunsinmachinemodeisthemeasurementroot.Thiscoderunsatboottime,andsetsupthesoftwareattestationchain.Itdoesnotplayanypartafterthebootprocesscompletes.

18

Page 19: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Let’sseehowSanctum givescomputerownersunprecedentedcontrolovertheirsystems.

19

Page 20: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Beforewegointoattestation,let’stalkalittlebitabout Sanctum’sbootprocess.OneofthethingsthatmakeSanctumspecialisthatthesecuritymonitor,whichismostofourlogic,isstoredinflashmemory,andcanbereplacedbythecomputer’sowner.

20

Page 21: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Inordertokeepthingssecure,werelyonthemeasurementrootcode,whichisstoredintheprocessor’sROM,andcannotbemodified.

21

Page 22: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Whenthecomputerpowersup,themeasurementrootreadsthesecuritymonitorandcomputesitscryptographichash.

22

Page 23: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

ThishashisfedintosomecryptographicmachinerythateventuallygeneratesanRSAkeypair,whichbecomesthemonitor’sattestationkey.

23

Page 24: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Finally,themeasurementrootusestheprocessor’sattestationkeytoissueacertificatethatcontainsthemonitor’spublicattestationkeyanditsmeasurementhash.Afterthishappens,themeasurementroothandscontrolovertothesecuritymonitor. Thekeyfacttonotehereisthatthemonitor’scertificatecontainsthemonitor’smeasurement.Ifthecomputerownermodifiesthemonitor,thechangeswillbereflectedintheattestationcertificate.

24

Page 25: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Ifyou’rehorrifiedbytheprospectofhavingtogenerateanRSAkeyoneveryboot,restassured.Wehaveamechanismtosecurelycachethemonitor’sRSAkeyinflash.Thisway,weonlyneedtoregeneratetheRSAkeywhenthecomputerownerreplacesthesecuritymonitor,whichshouldn’thappenveryoften.

25

Page 26: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

WeborrowedSGX’sgeneralapproachtoenclavemeasurement.Whenanenclaveiscreated,itisinaloadingstate, whereitcannotbeused.TheapplicationthatcreatedtheenclaveworkswiththeOStoallocateresourcestotheenclave,andtoloadtheinitialpagesofcodeanddataintotheenclave.Theparametersofeachloadingoperationarehashedandcontributetotheenclave’smeasurement.

Whentheloadingstageiscomplete,theenclaveisinitialized.Atthispoint,theenclave’smeasurementisfinalized,andthesecuritymonitorwillnotallowtheuseofanyloadingAPIontheenclave.So,anenclave’smeasurementisanaccuraterepresentationoftheenclave’sinitialmemorystate.

26

Page 27: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Nowthat youknowhowthebootprocessworks,you’llfindtherestoftheattestationtobeprettystandard.I’llgothroughitquickly,soyoucanseetheideasI’veoutlinedcometogether.

27

Page 28: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

First,youtrust theSanctumprocessormanufacturer,whichhasarootkey.

28

Page 29: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

EachSanctumprocessorhasa processorattestationkey,andanendorsementcertificatefromthemanufacturer.

29

Page 30: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Whenthecomputer powersup,themeasurementrootcreatesamonitorattestationkeypairandissuesanattestationcertificatetothemonitor.

30

Page 31: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Now,whenyouwanttosendyourcomputationover toaSanctumprocessor,yousendtheenclave’sinitialcontents,andachallengemessage.Theenclavestartsexecuting,readsthechallengemessage,andcomputestheresponsemessage.TheenclaveusesSanctum’ssecureinter-enclavecommunicationprimitivestosendahashofthechallengeresponsetotheSigningEnclave,whichisaspecialenclavethatthesecuritymonitortrusts.

31

Page 32: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

InSanctum,thesecuritymonitordoesnotperformanyoperationsusingtheprivateattestationkey.Instead,thereisaspecialSigningEnclave,whosemeasurementhashishard-codedintothesecuritymonitor.Thisistheonlyenclavethatcanreceivethemonitor’sprivateattestationkey.

32

Page 33: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

So,ourenclavemustuseSanctum’ssecureinter-enclavecommunicationprimitivestosendahashoftheresponsemessagetotheSigningEnclave.TheSigningEnclavecreatesanattestationsignaturethatcoversourenclave’smeasurementandtheresponsemessage.

33

Page 34: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Atthispoint,wecanexaminetheattestationsignature,andthemonitorandprocessor’sattestationcertificates,toconvinceourselvesthatwearecommunicatingwithanenclavebuiltaccordingtoourinstructions,hostedonaSanctumprocessorrunningasecuritymonitorthatwetrust.

34

Page 35: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Now,let’stalkabitaboutprotection.

35

Page 36: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Sanctumwasdesignedformulti-coreprocessorswithasharedlast-levelcache.Thismattersbecauseper-corecachescanbeprotectedprettyeasily– wheneveryouenterorexitanenclave,flushthecore’scaches.Thisisasimplestrategy,andwelikesimple,sothisisexactlywhatwedotoprotectper-corecaches.

ThesharedLLCismoreinteresting,becauseanattackerthreadcouldbeattemptingatimingattackatanytime.Sanctumusesaverysimplescheme,calledpagecoloring,whichIwilloutlinesoon.

36

Page 37: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Sanctum*almost*scalestoafull-fledgedInteldesktopsystem.Theoneaspectwedon’tsupportishyper-threading.Thisisbecausewithhyper-threading,there’sjustsimplytoomuchmicro-architectural resourcesharing.Wecouldn’tcomeupwithanysanewaytoprotectanenclavethreadfrombeingattackedbyathreadrunningonthesamecore.SoSanctumdoesn’tsupporthyper-threading.

37

Page 38: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Now,let’sturnontocachetimingattacks.Ataveryhigh level,theseattackstakeadvantageofthefactthatacachehitismuchfasterthanacachemiss.Virtuallyallcachetimingattacksrequiretheattackertoaccessthesamecacheasthevictim,sothememoryaccesstimingcanbeobserved.

Sanctumtargetsset-associativecaches,whicharethemostcommonlyusedcaches.Forthepurposeofthistalk,allthatmattersisthataset-associativecacheismadeupofmultiplesets,andamemorylocationcanonlybecachedinexactlyoneset,dependingonitsaddress.Conceptually,wecanpretendthateachsetinaset-associativecacheisaseparatecachememory.

38

Page 39: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

This istheinsightbehindcachepartitioning.Ifwecanensurethatmemoryownedbyanenclavewillneverendupinthesamecachesetasmemoryownedbyanattacker,wecanconsiderthattheenclaveandtheattackerareusingdifferentcaches.Thisdefeatscachetimingattacks,becausetheyrequireasharedcache.

39

Page 40: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Set-associativecaches usephysicalmemoryaddressesforsetindexcomputation.

40

Page 41: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Thisisconvenientforus,becausesoftwareusesaddresstranslation,whichabstractsawayphysicaladdressesalmostcompletely.Wecanasktheoperating systemtostructureitspagetablesinanywaythathelpsusachieveoursecuritygoal.

41

Page 42: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

PagecoloringessentiallycomesdowntothisobservationthatIjustmade.Therearesomephysical addressbitsthatbelongtothecachesetindex,andaresetbythepagetables.Thesebitscanbeusedtocontrolcacheplacement.

42

Page 43: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Theproblemis,bydefault,thepagecolorbitsareatthebottomofanaddress’physicalpagenumber.IfyoudrawyourDRAMandcoloreachpage,it’sgoingtolooklikethestackontheleft.

Thisisaproblembecause,inSanctum,we’dliketoassignsomecolorsexclusivelytoenclaves.Atthesametime,theoperatingsystemprobablyneedssomelargecontinuouschunksofDRAMforDMA.Forexample,ifyouhaveagraphicscardorahigh-performancenetworkcard,thesethingstendtolikelargeDMAbuffers.

43

Page 44: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

Weuseabitofhardwaretomungethephysicaladdressesastheyenterthecacheunit,andobtainthecolormapontheright.

InSanctum,theDRAMiseffectivelysplitintoequally-sizedDRAMregions,andeachregionmapstodisjointLLCsets.

44

Page 45: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

EachDRAMregioncanbeassignedtoexactlyoneenclave,ortotheoperatingsystemanditsuntrustedprocesses.Mostofeachenclave’svirtualaddressspaceismappedintothehostapplication’smemory,usingthepagetablespreparedbytheOSforthehostapplication.However,onecontinuousrangeisusedtomaptheenclave’sownDRAMregions,usingaseparatesetofpagetablesthatismanagedbytheenclave.

Thisgivesusisolationatalllevels.Thedatainanenclave’sDRAMregionsisnotaccessibletoanyothersoftware.Thepagetablesusedtomaptheenclave’sprivatememoryarealsoisolated,sotheydon’tleakmemoryaccesspatterns.

…andthiswrapsupmyhigh-leveloverview.Theexcitingdetailsareinthepaper!

45

Page 46: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

46

Page 47: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

47

Page 48: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

48

Page 49: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

49

Page 50: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

50

Page 51: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

51

Page 52: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

52

Page 53: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

53

Page 54: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

54

Page 55: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

55

Page 56: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

56

Page 57: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

57

Page 58: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

58

Page 59: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

59

Page 60: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

60

Page 61: Hi, everyone! Thank you very much for coming! Myname is ......Myname is Victor Costan, and I am here to talk about Sanctum. This work was done at MIT’s Computer Science and AI Laboratory,

61