All Products
Search
Document Center

Intel SGX

Last Updated: Sep 19, 2018

Intel Software Guard Extension (SGX) is an architecture extension developed by Intel. SGX protects selected code and data from malicious disclosure or modification through the use of enclaves, which are protected areas of execution in the central processing unit (CPU).

How SGX works

SGX sets aside one or more ranges of physical memory as the Enclave Page Cache (EPC) and encrypts the data stored in the EPC using the Memory Encryption Engine (MEE). The data stored in the EPC is only decrypted inside the CPU. SGX offers CPU-based security controls. Data remains protected even when the OS, VMM, or BIOS are compromised.

Application

You can encrypt sensitive data, pass the encrypted data to the enclave in the cloud, and provide the corresponding key to the enclave through remote attestation. Then you can compute over the fully encrypted data protected by the CPU, and the result is returned to you in an encrypted version. In this case, you can make use of the powerful cloud computing with low risk of data disclosure.

sgx-enclave-en

EDL

Enclave Definition Language (EDL) is the fundamental part of SGX. It defines all enclave interface functions. During the build process, the Edger8r tool generates trusted and untrusted proxy/bridge functions and performs security checks.

Enclave interface functions can be divided into Enclave Calls (ECALLs) and Outside Calls (OCALLs).

  • ECALL: A call from the application into an interface function within the enclave, which is defined as a trusted environment.
  • OCALL: A call made from within the enclave to the application, which is defined as an untrusted environment.
  1. // demo.edl
  2. enclave {
  3. // Add your definition of "secret_t" here
  4. trusted {
  5. public void get_secret([out] secret_t* secret);
  6. };
  7. untrusted {
  8. // This OCALL is for illustration purposes only.
  9. // It should not be used in a real enclave,
  10. // unless it is during the development phase
  11. // for debugging purposes.
  12. void dump_secret([in] const secret_t* secret);
  13. };
  14. };

Install SGX

You can install SGX using the installer file or source code including the SGX driver, SGX Platform Software (PSW), and SDK. For either method, you must install corresponding Linux kernel header files.

Note: The default directory for the Makefile in the example is /opt/intel/.

Install SGX using installer file

  1. Download SGX installer file.

  2. Follow the steps in the Installation Guide.

Install SGX using source code

  1. Download the source code from GitHub.

  2. To compile the source code, follow the steps described in the README.md file.