Is it possible to reverse engineer an Intel SGX application executable to get any meaningful text? If so, how is it secure if an adversary says a system admin could see the details of it?
Asked
Active
Viewed 343 times
2
-
may find this better on https://reverseengineering.stackexchange.com/ – Evan Carroll Feb 06 '18 at 17:12
-
1I request the admin to move it there. – Kumar Roshan Mehta Feb 06 '18 at 20:21
1 Answers
1
Yes you can decompile the executable. That isn't what SGX is designed to protect against. Short of encrypting code in a way that only the hardware holds the key to decrypt it you can always reverse engineer an executable.
What SGX gives you is protection against a running program being read or modified by another process / user. Don't forget the executable does not have to be present on persistent media once it has been loaded into memory. You can run an entire system in RAM only. If it were loaded into SGX enclaves it should be protected from the rest of the system.
Hector
- 10,893
- 3
- 41
- 44
-
Exactly. An "SGX executable" is just a normal executable that makes use of SGX. – forest Dec 09 '17 at 05:09