With hardware-based memory encryption, Intel SGX safeguards segregated application logic and sensitive data inside an enclave.
Using a hardware-based security mechanism like this necessitates a tight programming paradigm for memory consumption, as well as complicated APIs in and out of the enclave. To ensure enclave security, enclave developers must use rigorous programming approaches, especially when dealing with data flowing outside the enclave’s trusted boundary.
Attackers can utilise trusted boundary violations to retrieve and change protected data. They can also cause memory damage. For real-world enclaves, there are currently no publicly available techniques that can properly detect such vulnerabilities.
Disclaimer: The intended use for the tool is strictly educational and should not be used for any other purposes.
Download Link: https://github.com/baiduxlab/sgxray