Shuttle Docs
  • Trusted Execution Environments
    • Confidentiality
    • Execution Integrity
    • Remote Attestation
    • Threat Models
    • Side-Channel Attacks
    • Side-Channel Attack Mitigation
    • Model Types
  • Foreword
    • Shuttle
  • Solution #1
    • Blockchain | Framework Alignment
    • Enarx
    • Web Assembly System Interface(WASI)
  • Solution #2
    • Attestation
      • SGX DCAP
      • Intel Trust Authority
    • Decentralizing Attestation
      • It’s Butterfree!
      • Decentralized Public Key Infrastructure(DPKI)
      • Our Tool: Cryptographic Accumulator
      • Re-attestation
  • Blockchain
    • Reducing Computational Overhead
    • Ekiden
    • Verifier's Dilemma
    • Independent Layers
    • Security of Enclaves & Consensus
    • Non-Byzantine Computation
      • Discrepancy Detection - Good Idea Oasis!
    • Roughtime
  • Avalanche
    • Multi-dimensional Fees
    • Stakeless?
  • Privacy
    • Confidential Blockchain
    • Secret Network Vulnerability - 2022
  • Summary
    • Market Potential
    • Cosmos, Polkadot, Avalanche
Powered by GitBook
On this page
  1. Trusted Execution Environments

Model Types

There are currently two leading models of TEEs:

  • Process-based: current implementations include Intel’s SGX (Software Guard eXtensions).

  • VM-based: current implementations include AMD’s SEV (Secure Encrypted Virtualization).

It’s crucial that we know the same attack vector used to compromise one of the models would not be useful in the other.

PreviousSide-Channel Attack MitigationNextForeword

Last updated 8 months ago