Encrypt a program's memory without any SGX hardware #2147
-
The environment doesn't provide any SGX hardware, so the program can only run by gramine-direct. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Without hardware enforcement of mutual distrust, the OS kernel will be able to introspect on program memory and read secret data while it is in plaintext. So you can keep these strings in memory as ciphertext, but you can never decrypt them without revealing them to the host. Gramine-direct on such hardware cannot protect secret data from the host. There are other hardware models of mutual distrust than SGX, such as Intel TDX. But Gramine only supports SGX at the moment. |
Beta Was this translation helpful? Give feedback.
Without hardware enforcement of mutual distrust, the OS kernel will be able to introspect on program memory and read secret data while it is in plaintext. So you can keep these strings in memory as ciphertext, but you can never decrypt them without revealing them to the host. Gramine-direct on such hardware cannot protect secret data from the host.
There are other hardware models of mutual distrust than SGX, such as Intel TDX. But Gramine only supports SGX at the moment.