This repository was archived by the owner on May 3, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 27
SGX architectural
axelsimon edited this page Nov 22, 2019
·
7 revisions
A system with SGX 2 and EDMM support.
- SGX assumes that clients want proof that the application should be allowed to run within the enclave, and therefore applications need to be signed by Intel (or chain does…).
- Note that (as of 2017-07-04), as currently implemented in upstream Linux code, this requirement is loosened, and anybody can run anything in the enclave.
- A common model is for applications to attest from within the enclave by requesting validation from an Intel server online. Enarx will not use this model, instead relying on Intel's Data Center Attestation Primitives.