Skip to main content
Fig. 5 | EURASIP Journal on Information Security

Fig. 5

From: Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves

Fig. 5

Disadvantage of Third-party Packages for Confidentiality Management in Enclaves. Direct port of commodity software may leave additional side-channel traces which ruins the confidentiality guarantees of the hardware. a) Excerpt showing the Input Dependent Control Flow in js_run method of jsrun.c in MuJS interpreter. b) Excerpt showing the Input Dependent Data Access in bsearch method of utftype.c in MuJS interpreter. (Both Accessed on May 2018 Revision.)

Back to article page