Hacker News new | past | comments | ask | show | jobs | submit login

I should really read that paper, since I'm sort of confused by the threat model. Arbitrary queries seem like they would defeat the point. So I'm assuming this "using a secure, authenticated channel to communicate out, while still being monitored by the OS" model. That's a high bar for software not designed for SGX.

I presume it's relying on the paging behavior of SGX? (Either page faults or dirty bits).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: