Skip to content

Application using Gramine LibOS for attestation and tracing on SGX-capable host machines. Parent enclave monitoring applications in children enclaves.

License

Notifications You must be signed in to change notification settings

privateer-project/uProbe

Repository files navigation

uProbe

Application using Gramine LibOS for attestation and tracing on SGX-capable host machines.

Development mode

docker build -t 'privateer/secprobe-dev:latest' .

docker run --security-opt seccomp=config/docker_v20.json -it privateer/secprobe-dev:latest

gramine-direct python secprobe/secprobe.py

General

The flow of actions supported by this version:

Security Probe

Running with grammine-sgx (In SGX-enabled host)

Native execution in host

Run in a host with the following specs:

TBD

Dockerized execution

Docker image with python entrypoint

Manifest template: python.manifest.template

Docker image with Bundled application

Manifest template: uProbe.manifest.template

# If more than one containers need to be generated by the same Sealign Authority, the respective key (i.e., its directory) should be passed as a volume. For instance: -v /privateer/.config/gramine:/root/.config/gramine

docker run --name security_probe --device /dev/sgx_enclave --device /dev/sgx_provision --security-opt seccomp=/home/privateer/security-probe/docker.json -it -p '<docker image>'
# First time in the container
gramine-sgx-gen-private-key
# gramine-sgx <Manifest Name - i.e., tracer or agent>
gramine-sgx uProbe 

About

Application using Gramine LibOS for attestation and tracing on SGX-capable host machines. Parent enclave monitoring applications in children enclaves.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published