Offsite Link

Secure Linux* Containers Managed By Docker*

The Secure Linux* Container Environment (SCONE) is a mechanism for Docker* that uses the Intel® Software Guard Extensions trusted execution to protect container processes from outside attacks.
Authored by admin Last updated on 03/28/2019 - 11:24
Offsite Link

Protect Password Databases Using Trusted Hardware

A human-chosen password is relatively easy to guess and is frequently reused. Increase security by generating a random salt value for each user, and then concatenate it with the password before hashing.
Authored by admin Last updated on 03/28/2019 - 10:10
Article

Code Sample: Gateway Key Provisioning and Secure Signing using Intel® Software Guard Extensions

This application demonstrates the use of Intel® SGX to protect the private key of an asymmetric ECC 256 key pair.
Authored by admin Last updated on 07/01/2019 - 10:28
Article

Trusted CPU Feature Detection Library for Intel® Software Guard Extensions (Intel® SGX)

A means of probing for selected CPU features without exiting an Intel SGX enclave.
Authored by John M. (Intel) Last updated on 04/19/2019 - 08:11
File Wrapper

Integrating Remote Attestation with Transport Layer Security

Authored by admin Last updated on 04/25/2019 - 09:34
Article

Building the GNU* Multiple Precision* library for Intel® Software Guard Extensions

How to adapt the GNU Multiple Precision Arithmetic Library (GMP) to work in Intel SGX enclaves.
Authored by John M. (Intel) Last updated on 09/12/2019 - 18:10
Article

Using Enclaves from .NET*: Make ECALLS with Callbacks via OCALLS

Intel® SGX Code Sample: Learn how to mix enclaves with managed code on Microsoft Windows* platforms using the C# language. There are multiple solutions for accomplishing these tasks, and this article and its accompanying code sample demonstrate one approach.
Authored by John M. (Intel) Last updated on 10/08/2019 - 18:20
Article

C# Application with Intel® Software Guard Extensions

Enclaves must be 100 percent native code and the enclave bridge functions must be 100 percent native code with C (and not C++) linkages, it is possible, indirectly, to make an ECALL into an enclave

Authored by Last updated on 10/08/2019 - 18:20
Article

Intel® SGX Intro: Passing Data Between App and Enclave

Intro to Intel® Software Guard Extensions (Intel® SGX) directional enclave argument pointers. Sample code for passing data between enclave and application.
Authored by Isayah R. (Intel) Last updated on 10/08/2019 - 18:20
Article

Intel® Software Guard Extensions Part 3: Design an Application

In part 3 of this series, you'll learn how to design an application to take advantage of Intel® Software Guard Extensions (Intel® SGX). You'll examine the overall structure of an application, and then create a class model that prepares the app for enclave design and integration. Source code is included.
Authored by John M. (Intel) Last updated on 10/08/2019 - 18:20