SlideShare a Scribd company logo
11
Most read
16
Most read
17
Most read
FOR EXTERNAL USE – 12th September , 2017
LegalDisclaimersandNotices
No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document.
This document contains information on products, services and/or processes in development. All information provided here is subject
to change without notice. Contact your Intel representative to obtain the latest forecast, schedule, specifications and roadmaps.
The products described in this document may contain defects or errors known as errata which may cause the product to deviate from
published specifications. Current characterized errata are available on request.
Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to
Intel microprocessors. These optimizations include SSE2, SSE3, and SSE3 instruction sets and other optimizations. Intel does not
guarantee the availability, functionality, or effectiveness of any optimization on microprocessors not manufactured by Intel.
Microprocessor-dependent optimizations in this product are intended for use with Intel microprocessors. Certain optimizations not
specific to Intel microarchitecture are reserved for Intel microprocessors. Please refer to the applicable product User and Reference
Guides for more information regarding the specific instruction sets covered by this notice.
Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service
activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your
system manufacturer or retailer or learn more at intel.com.
Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
*Other names and brands may be claimed as the property of others.
© 2017 Intel Corporation
2
3
Modern computing requires a capability to store secrets and
execute securely – a “Trusted Execution Environment” (TEE). This
need is increasing with new and more advanced threats in
computing.
1
2
3 SGX is the result of many years of research and builds on a
foundation of knowledge of bringing multiple security
technologies to market and includes solutions to a number of
very interesting challenges…
Intel® Software Guard Extensions (Intel® SGX) is Intel’s TEE for
client and data center. It provides the foundation for many secure
use cases.
Trusted Execution for all developers
Executivesummary
4
Intel®SoftwareGuardExtension(SGX)Analogy
Intel® SGX is analogous to a safe in your hotel room
• You can put a few things in it – wallet, watch, sensitive
documents, keys, etc., … not your entire house.
• If the hotel experiences a catastrophic event, like a fire, your
high value items are secure.
• Similar to one’s high value items, our digital life needs to be
secure.
• SGX existence safeguards identity, data, and browsing, making
your life easier and better.
• SGX utilizes a small amount of CPU memory to protect sensitive
application information.
Intel®SGXIntel SGXprovidesatrustedcomputingenclave(island)wheredataandapplicationsareprotectedindependentlyoftheoperatingsystemorhardware
configurationitself.
 Protects against SW attacks even if OS/drivers/
BIOS/VMM/SMM are compromised
 Smallest possible Trusted Compute Block (TCB)
 Secrets (data/keys/et al) remain protected
even when attacker has full control of platform
 Other technologies allow some privileged SW in their
boundary
 Prevents attacks like memory bus snooping,
memory tampering, and “cold boot” attacks
against memory contents in RAM
 Protection for hard-to-protect or unprotected spaces
 Provides hardware-based attestation
capabilities to measure and verify valid code
and data signatures
 Increases transparency and accountability
5
Cloud
Tenant
&
Data
Provider
Untrusted - CSP Environment
Trusted – Intel® SGX enclave
Protected
Application
Protected
Input Data
Secrets
Ex. SSN, City,
Credit Card
Number
Encrypted
Data
Encrypted
Results
SGX enabled
solutions can
provide protection
for workloads
running on devices
Services&
Practices
Solutions
FPGA
PC Client DataCenter
Vehicles
Storage
New
Devices
Comms
AI &
Machine
Learning
Ecosystem3
Developers
4
SiliconFoundation1
5
IoT
2
SGX @ Root of Trust
SGX Protects App Data & Content
SGX APIs & SDKs
Attestation
Identity, Data, Compute
Enablingtrustedcomputing@thesiliconrootoftrust
6
7
Academic papers
More than 125 (83 in
2017) academic papers
written on use cases
(and potential
vulnerabilities) for SGX
Intel Confidential
New use cases are
being termed as
“art of
possibilities”
®
9
Execution Isolation at the Application boundary1
2
3 Recovery from HW Issues
Attestation and Sealing at the Application boundary
KeyChallenges
10
Execution Isolation at the Application boundary1
2
3 Recovery from HW Issues
Attestation and Sealing at the Application boundary
KeyChallenges
ReducingtheAttackSurface
Hyper-focusedtrustboundary
Application gains ability to defend its own
secrets
 Memory protection model changed for NEW protected
region of memory (PRM)
 New instructions added to create smallest attack surface
Familiar IA Development and Debug
 SDK & Integrated Dev Environment enhancements
Scalable
 Main core performance
 All HW threads can used inside an enclave
 Protected memory can be securely paged
11
Attack surface for legacy platforms
Attack surface with Intel® SGX
Hardware
VMM
OS
App App App
1
Platform
12
SGXHigh-levelHardware/SoftwarePicture
EPC
M
EPC
SGX
Module
SGX User
Runtime
Enclave
New Kernel Level
Instructions
ECREATE
EADD
EEXTEND
EINIT
EBLOCK
SGX User
Runtime
Enclave
Hdw Data Structure
Hardware
Runtime
Application
OS Data structure
Application
Environment
Privileged
Environment
New Exposed
Hardware
New Application
Level Instructions
EEXIT
EGETKEY
EREPORT
EENTER
ERESUME
Page
tables
ETRACK
EWB
ELD
EPA
EREMOVE
1
13
SGXAccessControl
Traditional
IA Page Table
Checks
Enclave
Access?
Address
in EPC?
Address
in EPC?
Check
EPCM
Checks
Pass ?
Signal
Fault
No
Yes
No
Yes
No
Allow
Memory
Access
Replace
Address
With Abort
Page
Yes
No
Yes
Linear
Address
Physical
Address
Non-Enclave
Access
Enclave
Access
1
Jco3lks937weu0cwejpoi9987v80we
IncreasingPhysicalAttackProtection
1. Security perimeter is the CPU package
boundary
2. Data and code unencrypted inside CPU
package
3. Data and code outside CPU package is
encrypted and integrity checked
4. External memory reads and bus snoops
see only encrypted data
14
System
Memory
Snoop
Snoop
Cores
CacheAMEX: 3234-
134584-26864
INTEL CONFIDENTIAL
15
Execution Isolation at the Application boundary1
2
3 Recovery from HW Issues
Attestation and Sealing at the Application boundary
KeyChallenges
16
CriticalFeatures:AttestationandSealing
Remote Platform
Client Application
Enclave
Authenticated Channel
Intel



• App executes on local platform
• HW based Attestation provides remote platform
assurance that “this is the right app executing in the
right platform”
=>Remote platform can provision local platform
with secrets
• App can seal secrets to platform for future use
2
17
Execution Isolation at the Application boundary1
2
3 TCB Recovery
Attestation and Sealing to the Application boundary
KeyChallenges
TCBRecovery
TCB recovery is the process of being able to cryptographically demonstrate that
the TCB has been updated to fix a potential security issue
 First we issue all the HW component with a
“Security Version Number”
 This is used to derive a “TCB specific” key from the
HW key in the part.
 When a new update is issued all keys are derived
from a new TCB specific key.
 Note: this mechanism is cannot be modified as part of a TCB update itself.
3
Unverifiable Code Base
HW Key TCB KeyPRF
TCB SVN
19
DataMigration
But what about all the data sealed to an previous TCB key?
 A backwards loop is used to provide forward
secrecy, but allows “previous” TCB specific keys
to be retrieved
 This allows the CPU to continue to “go back” by
performing additional PRF’s
Unverifiable Code Base
Initial Key TCB KeyPRF
Derivation String
(usually a constant)
Temp
Loop (MAX-SVN) times
20
Execution Isolation at the Application boundary1
2
3 Recovery from HW Issues
Attestation and Sealing at the Application boundary
KeyChallengessoftware.intel.com/SGX
The site has the latest info on:
SDK & Developer Resources
White Papers
Support Forum
21

More Related Content

PDF
XPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, Intel
The Linux Foundation
 
PDF
XPDS16: AMD's virtualization memory encryption technology - Brijesh Singh, A...
The Linux Foundation
 
PDF
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Kuniyasu Suzaki
 
PDF
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Michelle Holley
 
PDF
Qemu Pcie
The Linux Foundation
 
PDF
DPDK & Layer 4 Packet Processing
Michelle Holley
 
PDF
DAIS19: On the Performance of ARM TrustZone
LEGATO project
 
PDF
Intel(r) Quick Assist Technology Overview
Michelle Holley
 
XPDDS17: Introduction to Intel SGX and SGX Virtualization - Kai Huang, Intel
The Linux Foundation
 
XPDS16: AMD's virtualization memory encryption technology - Brijesh Singh, A...
The Linux Foundation
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Kuniyasu Suzaki
 
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Michelle Holley
 
DPDK & Layer 4 Packet Processing
Michelle Holley
 
DAIS19: On the Performance of ARM TrustZone
LEGATO project
 
Intel(r) Quick Assist Technology Overview
Michelle Holley
 

What's hot (20)

PDF
Andes open cl for RISC-V
RISC-V International
 
PDF
Intel dpdk Tutorial
Saifuddin Kaijar
 
PPTX
Ovs dpdk hwoffload way to full offload
Kevin Traynor
 
PDF
Lcu14 107- op-tee on ar mv8
Linaro
 
PDF
DPDK: Multi Architecture High Performance Packet Processing
Michelle Holley
 
PPTX
3D V-Cache
AMD
 
PPTX
Understanding DPDK
Denys Haryachyy
 
PDF
Disaggregating Ceph using NVMeoF
ShapeBlue
 
PPTX
Dpdk applications
Vipin Varghese
 
PPTX
DPDK KNI interface
Denys Haryachyy
 
PDF
DPDK In Depth
Kernel TLV
 
PPTX
Your 1st Ceph cluster
Mirantis
 
PDF
Holynix v1
BGA Cyber Security
 
PPT
NVIDIA CUDA
Jungsoo Nam
 
PDF
BPF Internals (eBPF)
Brendan Gregg
 
PDF
HKG15-311: OP-TEE for Beginners and Porting Review
Linaro
 
PPT
Parallel computing with Gpu
Rohit Khatana
 
PDF
High-Performance Networking Using eBPF, XDP, and io_uring
ScyllaDB
 
PDF
DDoS Saldırı Analizi - DDoS Forensics
BGA Cyber Security
 
PDF
Kernel Recipes 2019 - Faster IO through io_uring
Anne Nicolas
 
Andes open cl for RISC-V
RISC-V International
 
Intel dpdk Tutorial
Saifuddin Kaijar
 
Ovs dpdk hwoffload way to full offload
Kevin Traynor
 
Lcu14 107- op-tee on ar mv8
Linaro
 
DPDK: Multi Architecture High Performance Packet Processing
Michelle Holley
 
3D V-Cache
AMD
 
Understanding DPDK
Denys Haryachyy
 
Disaggregating Ceph using NVMeoF
ShapeBlue
 
Dpdk applications
Vipin Varghese
 
DPDK KNI interface
Denys Haryachyy
 
DPDK In Depth
Kernel TLV
 
Your 1st Ceph cluster
Mirantis
 
Holynix v1
BGA Cyber Security
 
NVIDIA CUDA
Jungsoo Nam
 
BPF Internals (eBPF)
Brendan Gregg
 
HKG15-311: OP-TEE for Beginners and Porting Review
Linaro
 
Parallel computing with Gpu
Rohit Khatana
 
High-Performance Networking Using eBPF, XDP, and io_uring
ScyllaDB
 
DDoS Saldırı Analizi - DDoS Forensics
BGA Cyber Security
 
Kernel Recipes 2019 - Faster IO through io_uring
Anne Nicolas
 
Ad

Similar to Intel software guard extension (20)

PPTX
SEAS_8998_Marjorie_Blanco_B_presentation_W3 .pptx
MarjorieBlanco3
 
PPTX
XPDDS18: Design Session - SGX deep dive and SGX Virtualization Discussion, Ka...
The Linux Foundation
 
PPTX
Review of Hardware based solutions for trusted cloud computing.pptx
ssusere142fe
 
PDF
Arch overview
maojunjie
 
PDF
Cryptography Processing with 3rd Gen Intel Xeon Scalable Processors
DESMOND YUEN
 
DOCX
08680982.pdfArchitectures for Security A comparative anal.docx
croftsshanon
 
PDF
Serie dei nuovi processori Xeon Scalabili - Yashi Italia
Yashi Italia
 
PDF
Intel HPC Update
IBM Danmark
 
PDF
SGX consensus
Tommy Koens
 
PDF
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Matthew Rosenquist
 
PDF
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
revostdaira
 
PDF
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan Auth
iluylva
 
PDF
8 intel network builders overview
videos
 
PDF
[Ebooks PDF] download Platform Embedded Security Technology Revealed 1st Edit...
tictacfeher
 
PDF
[FREE PDF sample] Intel Trusted Execution Technology for Server Platforms A G...
muelloheir1d
 
PDF
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
rezdjcggvq3827
 
PPTX
Hardware_root_trust_x86.pptx
Atul Vaish
 
PDF
Platform Observability and Infrastructure Closed Loops
Open Source Technology Center MeetUps
 
PDF
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Security Session
 
PDF
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
zuaniawaisan
 
SEAS_8998_Marjorie_Blanco_B_presentation_W3 .pptx
MarjorieBlanco3
 
XPDDS18: Design Session - SGX deep dive and SGX Virtualization Discussion, Ka...
The Linux Foundation
 
Review of Hardware based solutions for trusted cloud computing.pptx
ssusere142fe
 
Arch overview
maojunjie
 
Cryptography Processing with 3rd Gen Intel Xeon Scalable Processors
DESMOND YUEN
 
08680982.pdfArchitectures for Security A comparative anal.docx
croftsshanon
 
Serie dei nuovi processori Xeon Scalabili - Yashi Italia
Yashi Italia
 
Intel HPC Update
IBM Danmark
 
SGX consensus
Tommy Koens
 
Intel IT Experts Tour Cyber Security - Matthew Rosenquist 2013
Matthew Rosenquist
 
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
revostdaira
 
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan Auth
iluylva
 
8 intel network builders overview
videos
 
[Ebooks PDF] download Platform Embedded Security Technology Revealed 1st Edit...
tictacfeher
 
[FREE PDF sample] Intel Trusted Execution Technology for Server Platforms A G...
muelloheir1d
 
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
rezdjcggvq3827
 
Hardware_root_trust_x86.pptx
Atul Vaish
 
Platform Observability and Infrastructure Closed Loops
Open Source Technology Center MeetUps
 
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Security Session
 
Platform Embedded Security Technology Revealed 1st Edition Xiaoyu Ruan (Auth.)
zuaniawaisan
 
Ad

More from DESMOND YUEN (20)

PDF
2022-AI-Index-Report_Master.pdf
DESMOND YUEN
 
PDF
Small Is the New Big
DESMOND YUEN
 
PDF
Intel® Blockscale™ ASIC Product Brief
DESMOND YUEN
 
PDF
Intel 2021 Product Security Report
DESMOND YUEN
 
PDF
How can regulation keep up as transformation races ahead? 2022 Global regulat...
DESMOND YUEN
 
PDF
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
DESMOND YUEN
 
PDF
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
PDF
PUTTING PEOPLE FIRST: ITS IS SMART COMMUNITIES AND CITIES
DESMOND YUEN
 
PDF
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
DESMOND YUEN
 
PDF
An Introduction to Semiconductors and Intel
DESMOND YUEN
 
PDF
Changing demographics and economic growth bloom
DESMOND YUEN
 
PDF
Intel’s Impacts on the US Economy
DESMOND YUEN
 
PDF
2021 private networks infographics
DESMOND YUEN
 
PDF
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
DESMOND YUEN
 
PDF
Accelerate Your AI Today
DESMOND YUEN
 
PDF
Increasing Throughput per Node for Content Delivery Networks
DESMOND YUEN
 
PDF
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
DESMOND YUEN
 
PDF
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
DESMOND YUEN
 
PDF
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
DESMOND YUEN
 
PDF
Machine programming
DESMOND YUEN
 
2022-AI-Index-Report_Master.pdf
DESMOND YUEN
 
Small Is the New Big
DESMOND YUEN
 
Intel® Blockscale™ ASIC Product Brief
DESMOND YUEN
 
Intel 2021 Product Security Report
DESMOND YUEN
 
How can regulation keep up as transformation races ahead? 2022 Global regulat...
DESMOND YUEN
 
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
DESMOND YUEN
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
PUTTING PEOPLE FIRST: ITS IS SMART COMMUNITIES AND CITIES
DESMOND YUEN
 
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
DESMOND YUEN
 
An Introduction to Semiconductors and Intel
DESMOND YUEN
 
Changing demographics and economic growth bloom
DESMOND YUEN
 
Intel’s Impacts on the US Economy
DESMOND YUEN
 
2021 private networks infographics
DESMOND YUEN
 
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
DESMOND YUEN
 
Accelerate Your AI Today
DESMOND YUEN
 
Increasing Throughput per Node for Content Delivery Networks
DESMOND YUEN
 
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
DESMOND YUEN
 
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
DESMOND YUEN
 
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
DESMOND YUEN
 
Machine programming
DESMOND YUEN
 

Recently uploaded (20)

PDF
Micromaid: A simple Mermaid-like chart generator for Pharo
ESUG
 
PDF
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
PPT
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PDF
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
PPTX
PFAS Reporting Requirements 2026 Are You Submission Ready Certivo.pptx
Certivo Inc
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
DOCX
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
PPTX
Presentation about variables and constant.pptx
kr2589474
 
PDF
Bandai Playdia The Book - David Glotz
BluePanther6
 
PDF
Become an Agentblazer Champion Challenge
Dele Amefo
 
PPTX
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
PDF
Wondershare Filmora 14.5.20.12999 Crack Full New Version 2025
gsgssg2211
 
PDF
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PDF
Build Multi-agent using Agent Development Kit
FadyIbrahim23
 
PDF
The Role of Automation and AI in EHS Management for Data Centers.pdf
TECH EHS Solution
 
PDF
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
Micromaid: A simple Mermaid-like chart generator for Pharo
ESUG
 
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
PFAS Reporting Requirements 2026 Are You Submission Ready Certivo.pptx
Certivo Inc
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
Presentation about variables and constant.pptx
kr2589474
 
Bandai Playdia The Book - David Glotz
BluePanther6
 
Become an Agentblazer Champion Challenge
Dele Amefo
 
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
Wondershare Filmora 14.5.20.12999 Crack Full New Version 2025
gsgssg2211
 
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
Build Multi-agent using Agent Development Kit
FadyIbrahim23
 
The Role of Automation and AI in EHS Management for Data Centers.pdf
TECH EHS Solution
 
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 

Intel software guard extension

  • 1. FOR EXTERNAL USE – 12th September , 2017
  • 2. LegalDisclaimersandNotices No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. This document contains information on products, services and/or processes in development. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest forecast, schedule, specifications and roadmaps. The products described in this document may contain defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to Intel microprocessors. These optimizations include SSE2, SSE3, and SSE3 instruction sets and other optimizations. Intel does not guarantee the availability, functionality, or effectiveness of any optimization on microprocessors not manufactured by Intel. Microprocessor-dependent optimizations in this product are intended for use with Intel microprocessors. Certain optimizations not specific to Intel microarchitecture are reserved for Intel microprocessors. Please refer to the applicable product User and Reference Guides for more information regarding the specific instruction sets covered by this notice. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. © 2017 Intel Corporation 2
  • 3. 3 Modern computing requires a capability to store secrets and execute securely – a “Trusted Execution Environment” (TEE). This need is increasing with new and more advanced threats in computing. 1 2 3 SGX is the result of many years of research and builds on a foundation of knowledge of bringing multiple security technologies to market and includes solutions to a number of very interesting challenges… Intel® Software Guard Extensions (Intel® SGX) is Intel’s TEE for client and data center. It provides the foundation for many secure use cases. Trusted Execution for all developers Executivesummary
  • 4. 4 Intel®SoftwareGuardExtension(SGX)Analogy Intel® SGX is analogous to a safe in your hotel room • You can put a few things in it – wallet, watch, sensitive documents, keys, etc., … not your entire house. • If the hotel experiences a catastrophic event, like a fire, your high value items are secure. • Similar to one’s high value items, our digital life needs to be secure. • SGX existence safeguards identity, data, and browsing, making your life easier and better. • SGX utilizes a small amount of CPU memory to protect sensitive application information.
  • 5. Intel®SGXIntel SGXprovidesatrustedcomputingenclave(island)wheredataandapplicationsareprotectedindependentlyoftheoperatingsystemorhardware configurationitself.  Protects against SW attacks even if OS/drivers/ BIOS/VMM/SMM are compromised  Smallest possible Trusted Compute Block (TCB)  Secrets (data/keys/et al) remain protected even when attacker has full control of platform  Other technologies allow some privileged SW in their boundary  Prevents attacks like memory bus snooping, memory tampering, and “cold boot” attacks against memory contents in RAM  Protection for hard-to-protect or unprotected spaces  Provides hardware-based attestation capabilities to measure and verify valid code and data signatures  Increases transparency and accountability 5 Cloud Tenant & Data Provider Untrusted - CSP Environment Trusted – Intel® SGX enclave Protected Application Protected Input Data Secrets Ex. SSN, City, Credit Card Number Encrypted Data Encrypted Results
  • 6. SGX enabled solutions can provide protection for workloads running on devices Services& Practices Solutions FPGA PC Client DataCenter Vehicles Storage New Devices Comms AI & Machine Learning Ecosystem3 Developers 4 SiliconFoundation1 5 IoT 2 SGX @ Root of Trust SGX Protects App Data & Content SGX APIs & SDKs Attestation Identity, Data, Compute Enablingtrustedcomputing@thesiliconrootoftrust 6
  • 7. 7 Academic papers More than 125 (83 in 2017) academic papers written on use cases (and potential vulnerabilities) for SGX Intel Confidential New use cases are being termed as “art of possibilities”
  • 8. ®
  • 9. 9 Execution Isolation at the Application boundary1 2 3 Recovery from HW Issues Attestation and Sealing at the Application boundary KeyChallenges
  • 10. 10 Execution Isolation at the Application boundary1 2 3 Recovery from HW Issues Attestation and Sealing at the Application boundary KeyChallenges
  • 11. ReducingtheAttackSurface Hyper-focusedtrustboundary Application gains ability to defend its own secrets  Memory protection model changed for NEW protected region of memory (PRM)  New instructions added to create smallest attack surface Familiar IA Development and Debug  SDK & Integrated Dev Environment enhancements Scalable  Main core performance  All HW threads can used inside an enclave  Protected memory can be securely paged 11 Attack surface for legacy platforms Attack surface with Intel® SGX Hardware VMM OS App App App 1
  • 12. Platform 12 SGXHigh-levelHardware/SoftwarePicture EPC M EPC SGX Module SGX User Runtime Enclave New Kernel Level Instructions ECREATE EADD EEXTEND EINIT EBLOCK SGX User Runtime Enclave Hdw Data Structure Hardware Runtime Application OS Data structure Application Environment Privileged Environment New Exposed Hardware New Application Level Instructions EEXIT EGETKEY EREPORT EENTER ERESUME Page tables ETRACK EWB ELD EPA EREMOVE 1
  • 13. 13 SGXAccessControl Traditional IA Page Table Checks Enclave Access? Address in EPC? Address in EPC? Check EPCM Checks Pass ? Signal Fault No Yes No Yes No Allow Memory Access Replace Address With Abort Page Yes No Yes Linear Address Physical Address Non-Enclave Access Enclave Access 1
  • 14. Jco3lks937weu0cwejpoi9987v80we IncreasingPhysicalAttackProtection 1. Security perimeter is the CPU package boundary 2. Data and code unencrypted inside CPU package 3. Data and code outside CPU package is encrypted and integrity checked 4. External memory reads and bus snoops see only encrypted data 14 System Memory Snoop Snoop Cores CacheAMEX: 3234- 134584-26864 INTEL CONFIDENTIAL
  • 15. 15 Execution Isolation at the Application boundary1 2 3 Recovery from HW Issues Attestation and Sealing at the Application boundary KeyChallenges
  • 16. 16 CriticalFeatures:AttestationandSealing Remote Platform Client Application Enclave Authenticated Channel Intel    • App executes on local platform • HW based Attestation provides remote platform assurance that “this is the right app executing in the right platform” =>Remote platform can provision local platform with secrets • App can seal secrets to platform for future use 2
  • 17. 17 Execution Isolation at the Application boundary1 2 3 TCB Recovery Attestation and Sealing to the Application boundary KeyChallenges
  • 18. TCBRecovery TCB recovery is the process of being able to cryptographically demonstrate that the TCB has been updated to fix a potential security issue  First we issue all the HW component with a “Security Version Number”  This is used to derive a “TCB specific” key from the HW key in the part.  When a new update is issued all keys are derived from a new TCB specific key.  Note: this mechanism is cannot be modified as part of a TCB update itself. 3 Unverifiable Code Base HW Key TCB KeyPRF TCB SVN
  • 19. 19 DataMigration But what about all the data sealed to an previous TCB key?  A backwards loop is used to provide forward secrecy, but allows “previous” TCB specific keys to be retrieved  This allows the CPU to continue to “go back” by performing additional PRF’s Unverifiable Code Base Initial Key TCB KeyPRF Derivation String (usually a constant) Temp Loop (MAX-SVN) times
  • 20. 20 Execution Isolation at the Application boundary1 2 3 Recovery from HW Issues Attestation and Sealing at the Application boundary KeyChallengessoftware.intel.com/SGX The site has the latest info on: SDK & Developer Resources White Papers Support Forum
  • 21. 21