Shuttle Docs
  • Trusted Execution Environments
    • Confidentiality
    • Execution Integrity
    • Remote Attestation
    • Threat Models
    • Side-Channel Attacks
    • Side-Channel Attack Mitigation
    • Model Types
  • Foreword
    • Shuttle
  • Solution #1
    • Blockchain | Framework Alignment
    • Enarx
    • Web Assembly System Interface(WASI)
  • Solution #2
    • Attestation
      • SGX DCAP
      • Intel Trust Authority
    • Decentralizing Attestation
      • It’s Butterfree!
      • Decentralized Public Key Infrastructure(DPKI)
      • Our Tool: Cryptographic Accumulator
      • Re-attestation
  • Blockchain
    • Reducing Computational Overhead
    • Ekiden
    • Verifier's Dilemma
    • Independent Layers
    • Security of Enclaves & Consensus
    • Non-Byzantine Computation
      • Discrepancy Detection - Good Idea Oasis!
    • Roughtime
  • Avalanche
    • Multi-dimensional Fees
    • Stakeless?
  • Privacy
    • Confidential Blockchain
    • Secret Network Vulnerability - 2022
  • Summary
    • Market Potential
    • Cosmos, Polkadot, Avalanche
Powered by GitBook
On this page

Trusted Execution Environments

Trusted Execution Environments(TEE) are a promising technology to enhance securely processing information in otherwise untrusted environments. TEE’s are becoming a commonplace addition to the CPU instruction set of most server architectures. They represent an important advancement in the use of hardware to protect code and data, allowing us to secure the execution of certain programs or processes.

They are used to create secure Enclaves which provide important hardware-based security promises including:

Confidentiality: all the memory values are encrypted

Execution Integrity: no one can corrupt the correctness of the execution even if they control the operating system and the physical computer

Remote Attestation: users can remotely verify the hardware and the software running inside the secure enclave

NextConfidentiality

Last updated 6 months ago