Questions tagged [intel-sgx]

21 questions
17
votes
1 answer

What are the functional similarities and differences between TPM and SGX in trusted computing?

I know about the TPM (Trusted Platform Module). In recent years, more researchers start to develop on Intel SGX, which I do not have any experience with. They are both crypto chips, but what are their functional similarities and difference? What…
TJCLK
  • 818
  • 8
  • 23
13
votes
1 answer

How does Meltdown/Spectre impact Intel SGX?

I've been reading about Meltdown and Spectre today, and I'm wondering if they impact Intel SGX enclaves. Now, my understanding of Meltdown is somewhat hazy, but AFAICT it does not impact secure enclaves, because it relies on the kernel being mapped…
strugee
  • 688
  • 1
  • 6
  • 16
9
votes
1 answer

Do fTPM implementations protect against physical attacks?

I see that there is an increasing number of PCs shipped with firmware based TPM (fTPM), e.g. the Intel NUC. As far as I understand, these solutions practically emulate a TPM chip using the CPUs special instructions (ARM TrustZone or Intel SGX). This…
KovBal
  • 313
  • 2
  • 8
7
votes
2 answers

Freshness for SGX enclaves

Future Intel processors will support SGX (Software Guard Extensions), which allows running security-critical software on your processor in a way that is isolated from all the other code. The hardware provides secure isolation, so other code can't…
D.W.
  • 98,420
  • 30
  • 267
  • 572
5
votes
1 answer

Could Intel SGX be dangerous under Linux?

Question Background This morning, by accident I have found, that there is basically a backdoor in a dormant state in my Dell laptop: Computrace, which comes from Absolute Software - link to their Web, link to Wikipedia. Actual Question Since I read…
LinuxSecurityFreak
  • 1,562
  • 2
  • 18
  • 32
5
votes
1 answer

What are the concerns, or drawbacks, regarding Intel's SGX when it comes to privacy?

I was in a workshop about privacy recently and at some point, a passionate debate started about Intel's Software Guard Extensions (SGX). Although I have a security background (Master in Information Security), I find it very difficult to understand…
Aventinus
  • 329
  • 4
  • 14
4
votes
1 answer

What Trusted Execution Environment (TEE) solutions exist for mobile devices?

A trusted execution environment (TEE) provides a way for one to deploy tamper-proof programs on a device. The most prominent example of TEEs seem to be Intel SGX for PCs. What I wonder is, if there exists an equivalent solution for mobile devices.…
SpiderRico
  • 177
  • 5
4
votes
0 answers

AMD SEV equivalent of Intel SGX EGETKEY?

An application running under Intel SGX can invoke EGETKEY to obtain an encryption key from the CPU HW. The same key will be obtained each time the application is run. This allows the application to encrypt data with the key (a/k/a seal it to the SGX…
Stephen Warren
  • 246
  • 1
  • 6
4
votes
2 answers

Does Intel or Arm support private key memory?

I know some security processors have an isolated bus where you can store a private key and use it with hardware encryption without the key ever being stored in memory. Some even have key storage inside the SoC on an isolated bus so there's no…
Michael Fox
  • 143
  • 5
3
votes
1 answer

How does Intel SGX protect itself from being simulated?

I'm trying to understand how secure Intel SGX actually is. According to Intel: Note that developers cannot rely on a measurement supplied by system software; as noted earlier, software can always be virtualized or otherwise spoofed by suitably…
rustyx
  • 751
  • 6
  • 10
2
votes
1 answer

Storing LUKS master key in SGX enclave

Is it possible to store the master decryption key for accessing a LUKS encrypted volume inside an SGX enclave so that the master key cannot be accessed by any user on the system, even the root user with privileges to make system calls? Currently,…
Michael Altfield
  • 826
  • 4
  • 19
2
votes
1 answer

Intel SGX - Remote attestation

I am currently reading up on Intel's SGX, especially the remote attestation part. I am having a questions regarding this topic. Let us consider the following protocol: Enclave A and B do remote attestation. Each of them generates an asymmetric key…
Donut
  • 141
  • 4
2
votes
1 answer

Putting secrets into enclave

How a client machine could put secrets into the sgx enabled server protecting from man in the middle considering server os as malicious and also I read somewhere on internet that you should not create secrets into enclave rather you should put…
2
votes
1 answer

Reverse engineering SGX executable

Is it possible to reverse engineer an Intel SGX application executable to get any meaningful text? If so, how is it secure if an adversary says a system admin could see the details of it?
2
votes
0 answers

Using SGX for connection establishing

I'm quite new to SGX and still trying to figure out the possibilities it provides. Currently I have two applications (A1, A2) running on a server. Both have their own enclaves created and the two enclaves are communicating over a secure channel…
wasp256
  • 173
  • 1
  • 6
1
2