Skip to content

Encrypt a program's memory without any SGX hardware #2147

Closed Answered by donporter
oktaybasak368 asked this question in Q&A
Discussion options

You must be logged in to vote

Without hardware enforcement of mutual distrust, the OS kernel will be able to introspect on program memory and read secret data while it is in plaintext. So you can keep these strings in memory as ciphertext, but you can never decrypt them without revealing them to the host. Gramine-direct on such hardware cannot protect secret data from the host.

There are other hardware models of mutual distrust than SGX, such as Intel TDX. But Gramine only supports SGX at the moment.

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by donporter
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants