On Tue 2018-09-25 16:06:56, Jarkko Sakkinen wrote:
+Intel(R) SGX is a set of CPU instructions that can be used by applications to
+set aside private regions of code and data. The code outside the enclave is
+disallowed to access the memory inside the enclave by the CPU access control.
+In a way you can think that SGX provides inverted sandbox. It protects the
+application from a malicious host.
Well, recently hardware had some problems keeping its
promises. So... what about rowhammer, meltdown and spectre?
Which ones apply, which ones do not, and on what cpu generations?
Encryption, that sounds nice, but it is hard to do right. If SGX
protected code changes single bit in its memory, how many bits will be
changed in physical RAM?