Can someone clarify something important for me? Is an attacker that can mess with the hardware in-scope for the SGX threat model?
-
-
information about SGX is all over the place. A bit difficult sometimes to put fact together. Lot of insight in https://software.intel.com/sites/default/files/332680-001.pdf …
-
some info about the adversary model from slide 111. Memory encryption engine from slide 170.
-
"Security perimeter is the CPU package boundary" in slide 30.
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.