Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Flicker: An Execution Infrastructure for TCB Minimization

Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki


We present Flicker, an infrastructure for executing security-sensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide meaningful, fine-grained attestation of the code executed (as well as its inputs and outputs) to a remote party. Flicker guarantees these properties even if the BIOS, OS and DMA-enabled devices are all malicious. Flicker leverages new commodity processors from AMD and Intel and does not require a new OS or VMM. We demonstrate a full implementation of Flicker on an AMD platform and describe our development environment for simplifying the construction of Flicker-enabled code.


Publication typeInproceedings
Published inProceedings of the ACM European Conference on Computer Systems (EuroSys)
PublisherAssociation for Computing Machinery, Inc.
> Publications > Flicker: An Execution Infrastructure for TCB Minimization