On Thu 2018-10-18 02:45:27, Jarkko Sakkinen wrote: > On Mon, 15 Oct 2018, Pavel Machek wrote: > >On Tue 2018-09-25 16:06:56, Jarkko Sakkinen wrote: > >>+Intel(R) SGX is a set of CPU instructions that can be used by applications to > >>+set aside private regions of code and data. The code outside the enclave is > >>+disallowed to access the memory inside the enclave by the CPU access control. > >>+In a way you can think that SGX provides inverted sandbox. It protects the > >>+application from a malicious host. > > > >Well, recently hardware had some problems keeping its > >promises. So... what about rowhammer, meltdown and spectre? > > Doesn't hardware always have this problem over time? No, not really. In this case, tries to protect from hardware "attacks" done by machine owner. That job is theoretically impossible, so you have harder situation than most.. > >Which ones apply, which ones do not, and on what cpu generations? > > Definitely should be refined. > > Meltdowns approach AFAIK does not work because reads outside the enclave > will always have a predefined value (-1) but only if the page is present, > which was later exploited in the Foreshadow attack. What about L1tf and https://github.com/lsds/spectre-attack-sgx ? Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
Attachment:
signature.asc
Description: Digital signature