| Carl-Friedrich-Gauß-Faculty | Computer Science

Seminar Informatik WS 2016/2017 Verteilte Systeme: Secure Trusted Execution for Resilient Distributed Systems

Semester Winter 2016/2017 [ Other terms: Winter 17/18 · Sommer 17 · Winter 15/16 · Sommer 15 · Winter 14/15 · Sommer 14 · Sommer 13 · Sommer 12 ]
Module # INF-VS-041
Programmes Bachelor Informatik, Master Informatik, Bachelor Informations-Systemtechnik, Master Informations-Systemtechnik, Bachelor Wirtschaftsinformatik, Master Wirtschaftsinformatik
IBR Group(s) DS (Prof. Kapitza)
Type Seminar
Photo Prof. Dr. Rüdiger Kapitza
+49 531 3913294
Room 135
Photo Nico Weichbrodt
Wissenschaftlicher Mitarbeiter
+49 531 3913265
Room 116
Photo Bijun Li
Wissenschaftliche Mitarbeiterin
+49 531 3913295
Room 117
Photo Stefan Brenner
Wissenschaftlicher Mitarbeiter
+49 531 3913285
Room 112
Photo Wenbo Xu
Wissenschaftlicher Mitarbeiter
+49 531 3913266
Room 131
Photo David Goltzsche
Wissenschaftlicher Mitarbeiter
+49 531 3913249
Room 134
Credits 5
Hours 0+2
Time & Place

*Kick-Off Meeting* Wednesday 19 Oct. 2016, 15:00-16:00, (IZ Room 105)

Weekly meeting time: Wednesday, 15:00 (IZ Room 105)

Certificates Submission of the essay and successful presentation. The grade is determined by the activity in the seminar as well as the quality of essay and presentation.


Recent events like the NSA leaks prove the need for action in the field of IT security. This is a challenge, especially in the context of cloud computing: Users willingly release the control over their data, although the cloud providers are not completely trustworthy in general. This problem can be solved using novel hardware extensions like Intel SGX, which enable so-called Trusted Execution.

In this seminar, the different approaches of trusted execution will be covered (T1-4). On this basis, different applications of trusted execution will be examined (T5-9), while the remaining topics describe systems with trusted components which could be implemented with trusted execution(T10-13). In addition, the seminar discusses different attacks on SGX-protected applications (T14-15).


Punkte der einzelnen Aufgaben:
Punkte gesamt:
Haftungsausschluss: Alle Ergebnisse wurden mit größter Sorgfalt zusammengetragen. Fehler lassen sich jedoch nicht Ausschließen. Die Ergebnisse sind nur gültig im Zusammenhang mit einer rechtzeitigen Anmeldung beim Prüfungsamt. Rechtliche Ansprüche lassen sich hieraus nicht ableiten.

Seminar Topics

Topic Assistant
1) Intel Software Guard Extensions: Basics David Goltzsche
2) Fides: Selectively Hardening Software Application Components against Kernel-level or Process-level Malware Stefan Brenner
3) OASIS On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms Stefan Brenner
4) SecureBlue++: CPU Support for Secure Executables Nico Weichbrodt
5) Shielding Applications from an Untrusted Cloud with Haven Nico Weichbrodt
6) SCONE: Secure Linux Containers with Intel SGX David Goltzsche
7) VC3: Trustworthy Data Analytics in the Cloud using SGX David Goltzsche
8) SecureKeeper: Confidential ZooKeeper using Intel SGX Stefan Brenner
9) Ariadne: A Minimal Approach to State Continuity Stefan Brenner
10) Efficient Byzantine fault Tolerance (MinBFT) Wenbo Xu
11) CheapBFT: Resource-efficient Byzantine Fault Tolerance Bijun Li
12) Prophecy: Using History for High-Throughput Fault Tolerance Bijun Li
13) Attested Append-Only Memory: Making Adversaries Stick to their Word Wenbo Xu
14) AsyncShock: Exploiting Synchronization Bugs in Intel SGX Enclaves Nico Weichbrodt
15) Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems Nico Weichbrodt


The talk and essay can be in either English or German. Each participant will take one or more papers under a specific topic. Participants are responsible for a peer review, including:

  • Attend peer's presentation dry run and give feedback.
  • Review peer's essay before submission.
  • Collect questions to peer's presentation during discussion session.


Please submit the essay as well as your presentation slides. The requirements for presentation and essay are listed as follows:

  • Presentation and essay in English or German.
  • Presentation time about 25 minutes.
  • Essay should comprise about 6 pages.

Each participant is supposed to do further research based on the paper. The supervisors are always glad to help in this case.

The strength of the university depends on academic and personal integrity. In this seminar, essays must be done in your own words. Plagiarism is an offense against the examination regulations.


The LaTeX template for seminar essay can be found here.

Additional considerations for the design of the essay can be found on the website of IBR.

LaTeX templates for presentation slides can be found here.

Additional considerations for the design can be found on the website of IBR.

[ Subscribe Calendar | Download Calendar ]
Date Description
19.10.2016, 15:00 Uhr Kick-Off Meeting (IZ Raum 105)
26.10.2016, 15:00 Uhr How to give a presentation (IZ Raum 105)
02.11.2016, 15:00 Uhr Nichts (yay!) (IZ Raum 105)
09.11.2016, 15:00 Uhr Ausfall, nur Dry-Runs (Fides) (IZ Raum 119)
16.11.2016, 15:00 Uhr Fides (IZ Raum 105)
23.11.2016, 15:00 Uhr OASIS, SGX Basics (IZ Raum 105)
30.11.2016, 15:00 Uhr Attested Append-Only Memory, Haven (IZ Raum 105)
07.12.2016, 15:00 Uhr SecureKeeper, SCONE (IZ Raum 105)
14.12.2016, 15:00 Uhr MinBFT, SecureBlue++ (IZ Raum 105)
21.12.2016, 15:00 Uhr Ausfall, Uni geschlossen (IZ Raum 105)
28.12.2016, 15:00 Uhr Ausfall, Uni geschlossen (IZ Raum 105)
04.01.2017, 15:00 Uhr Ausfall, Weihnachtsferien (IZ Raum 105)
11.01.2017, 15:00 Uhr Ausfall, nur Betreuermeetings in der Woche (Prophecy, VC3)
18.01.2017, 15:00 Uhr Ausfall, nur Dry-Runs (Prophecy, VC3) (IZ Raum 105)
25.01.2017, 15:00 Uhr Prophecy, VC3 (IZ Raum 105)
01.02.2017, 15:00 Uhr Controlled-Channel Attacks, AsyncShock (IZ Raum 105)
08.02.2017, 15:00 Uhr TBD (IZ Raum 105)


On World-Wide-Web, there are different ways to enhance your seminar presentations:

For the literature review there links might be helpful:

(La)TeX Tips + Tricks

last changed 2017-03-27, 15:16 by Stefan Brenner