This repository was archived by the owner on May 3, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 27
SGX architectural
Mike Bursell edited this page Jul 4, 2019
·
7 revisions
A system with SGX 2 and EDD support.
- SGX assumes that clients want proof that the application should be allowed to run within the enclave, and therefore applications need to be signed by Intel (or chain does…). Note that (as of 2017-07-04), as currently implemented in upstream Linux code, this requirement is loosened, and anybody can run anything in the enclave.
- Applications attest from within the enclave by requesting validation from an Intel server online. Other modes of attestation may be possible.