Thanks for the explanations everyone! And a blog post sounds like a great idea.

On Wed, 10 Jun 2020 at 17:50, Mingshen Sun <ms...@apache.org> wrote:
>
> BTW, maybe we can write a blog about the implication of recent side
> channel attacks in SGX. But we need some time to survey this problem
> and collect enough materials.
>
> On Wed, Jun 10, 2020 at 3:18 PM Mingshen Sun <ms...@apache.org> wrote:
> >
> > Hi Matt,
> >
> > Thanks for bringing up this issue. Regardless of this specific attack
> > itself, let me answer another frequently asked question about
> > supporting other hardware enclaves.
> >
> > Actually, we have investigated other hardware enclaves for a long
> > time. The following are commonly mentioned hardware TEE
> > implementations:
> >
> > - Intel SGX
> > - AMD SEV
> > - ARM TrustZone
> > - RISC-V Keystone
> >
> > From our experience, Intel SGX provides better security guarantees
> > memory encryption/integrity. Also it is more mature in terms of
> > ecosystem including toolchains, documents, community, etc. Sadly,
> > because of various reasons, they all somehow suffer from side channel
> > attacks. Luckly, there are mitigation methods for these attacks.
> >
> > To answer the question, yes, we do want to support other hardware TEE
> > implementations and provide different choices for users/developers. I
> > believe as the time goes on, other TEE implementations will become
> > mature eventually. Before that, we plan to spend more time on
> > implementing the platform itself: providing better interfaces,
> > improving functionalities of services, defining the work flow, etc. In
> > the meantime, we should  also design the system with better
> > abstraction with layers so that once things are ready, we can support
> > other platforms.
> >
> > Best,
> > Mingshen Sun
> >
> > On Wed, Jun 10, 2020 at 1:50 PM Yu Ding <din...@apache.org> wrote:
> > >
> > > From what I understand, SGAxe is still utilizing TSX to leak data from 
> > > LFB.
> > > It's not a problem of SGX, but a problem of TSX. TSX breaks the security
> > > guarantees provided by SGX, or VMX.
> > >
> > > The TSX problem is not limited to attacking SGX, but also stealing memory
> > > from Dom0 in Xen, or memory from the kernel of Host OS. To solve this
> > > problem, TSX needs to be completely removed/disabled. It's a long-existing
> > > problem. Intel tried to remove TSX from a couple of commercial SKUs but
> > > haven't done it completely.
> > >
> > > Best,
> > > Yu
> > >
> > > On Wed, Jun 10, 2020 at 7:43 AM Matt Sicker <boa...@gmail.com> wrote:
> > >
> > > > https://cacheoutattack.com/
> > > >
> > > > With all these practical attacks in place for Intel (and AMD to a
> > > > different extent), what do you think the future of SGX and its
> > > > competitors will look like? Are there plans on supporting other
> > > > hardware enclaves that may be more secure (if they exist)?
> > > >
> > > > --
> > > > Matt Sicker <boa...@gmail.com>
> > > >
> > > > ---------------------------------------------------------------------
> > > > To unsubscribe, e-mail: dev-unsubscr...@teaclave.apache.org
> > > > For additional commands, e-mail: dev-h...@teaclave.apache.org
> > > >
> > > >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@teaclave.apache.org
> For additional commands, e-mail: dev-h...@teaclave.apache.org
>


-- 
Matt Sicker <boa...@gmail.com>

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@teaclave.apache.org
For additional commands, e-mail: dev-h...@teaclave.apache.org

Reply via email to