SGX 101
  • Home
  • SSLab
  • SGX Bootstrap
    • Overview
    • Enclave
      • Communication between Architectural and Application Enclaves
    • Attestation
      • Inter-process Local Attestation
    • Sealing
    • Real-world Example
    • CCS'17 Tutorial
    • Technion'18 Summer School Program
  • SGX Security
    • Memory Corruption
    • Uninitialized Memory
    • Page-table-based Attacks
    • Cache Attacks
    • Branch Shadowing
    • Row Hammer Attacks
    • Speculative Execution Side Channels
  • Other Resources
  • About Us
Powered by GitBook
On this page
  • Introduction
  • SGX-Bleed

Was this helpful?

  1. SGX Security

Uninitialized Memory

PreviousMemory CorruptionNextPage-table-based Attacks

Last updated 5 years ago

Was this helpful?

Introduction

Another type of vulnerabilities is uninitialized memory that may allow untrusted host (i.e., the OS) to infer the data inside an enclave.

SGX-Bleed

This video shows how the SGX-Bleed problem leaks uninitialized SGX memory via structure padding.