Skip to main content

Table 2 Two approaches on secret-code execution through SGX enclaves

From: Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves

 

Approach 1

Approach 2

Responsible for secrecy

Algorithm Owner

Hardware Owner

Secrecy ensured

Before sending the code

After receiving the code

Development type

Enclave-aware coding

Enclave-independent code

TCB/threat analysis

In Section 6

In Section 4

Enclave developer

The Private Algorithm must be developed for Enclave

The Enclave must be made for Private Algorithm