Intel SGX and Spectre

49 views
Skip to first unread message

awokd

unread,
Feb 25, 2018, 6:24:11 AM2/25/18
to qubes...@googlegroups.com
I found the following humourous:

"there is no credible engineering rationale to support the contention that
SGX enclaves will provide confidentiality guarantees in the face of these
new micro-architectural cache probing attacks."
https://idfusionllc.com/2018/01/25/sgx-after-spectre-and-meltdown-status-analysis-and-remediations/

And in a post here from June 28, 2016: "VM CPU mapping -
countermeasurements against covert channels via cpu caches?"
"With SGX, the memory is encrypted so that
it cannot be "read", however, the CPU still does calculations of an SGX
enclave the same way as without them which creates the opportunity for
the very same covert channels to form."
https://mail-archive.com/qubes...@googlegroups.com/msg01200.html




Tai...@gmx.com

unread,
Feb 25, 2018, 4:57:31 PM2/25/18
to aw...@danwin1210.me, qubes...@googlegroups.com
SGX is a DRM anti-feature mechanism that prevents people from inspecting
what runs on their own computer and it enables malware that is immune to
antivirus programs because it runs in an ME enclave.

https://software.intel.com/en-us/sgx/details

"Hardening DRM for enhanced high definition, 4K ultra high definition
(UHD) content protection"

awokd

unread,
Feb 26, 2018, 7:52:57 AM2/26/18
to Tai...@gmx.com, aw...@danwin1210.me, qubes...@googlegroups.com
That's the part I found amusing. They sold their closed-source,
proprietary code running on ME as a "secure" enclave, but there was
conjecture on this very list two years ago that it was not and it was
proven with the Spectre exploit.


Reply all
Reply to author
Forward
0 new messages