Software Guard Extensions
Intel SGX is a set of new instructions from Intel that allows user-level code to allocate private regions of memory, called enclaves, that unlike normal process memory is also protected from processes running at higher privilege levels.[1]
Support of SGX is indicated in CPUID "Structured Extended feature Leaf", EBX bit 02.[2]
Emulation of SGX was added to experimental version of QEMU system emulator in 2014.[3] In 2015, Georgia Tech university released an open-source simulator known as OpenSGX.
It was introduced in 2015 with the sixth generation Intel Core microprocessors based on the Skylake microarchitecture.
References
- ↑ "Intel® SGX for Dummies (Intel® SGX Design Objectives)". intel.com. 2013-09-26.
- ↑ Intel Architecture Instruction Set Extensions Programming Reference, Intel, AUGUST 2015, page 36 "Structured Extended feature Leaf EAX=07h, EBX Bit 02: SGX"
- ↑ https://tc.gtisc.gatech.edu/bss/2014/l/final/pjain43.pdf
External links
- Intel Software Guard Extensions (Intel SGX) / ISA Extensions, Intel
- Intel Software Guard Extensions (Intel SGX) Programming Reference, Intel, October 2014
- IDF 2015 - Tech Chat: A Primer on Intel® Software Guard Extensions, Intel (poster)
- ISCA 2015 tutorial slides for Intel SGX, Intel, June 2015
- McKeen, Frank, et al. (Intel), Innovative Instructions and Software Model for Isolated Execution // Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. ACM, 2013.
- Joanna Rutkowska, Thoughts on Intel's upcoming Software Guard Extensions (Part 1), August 2013
- SGX: the good, the bad and the downright ugly / Shaun Davenport, Richard Ford (Florida Institute of Technology) / Virus Bulletin, 2014-01-07
This article is issued from Wikipedia - version of the Wednesday, April 27, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.