Skip to content

A curated list of resources for learning about Trusted Execution Environments (TEEs) in the context of blockchains.

License

Notifications You must be signed in to change notification settings

dineshpinto/awesome-tee-blockchain

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

54 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Awesome TEE Blockchain Awesome

Check Links

A curated list of resources for learning about Trusted Execution Environments (TEEs) and their applications in the blockchain space.

Contributions are welcome! See CONTRIBUTING.md.

Getting Started

Articles, talks and presentations to help you get started with TEEs.

Articles

Research Papers

Key research works covering different aspects of TEEs.

Hardware Platforms

The underlying silicon providing TEE capabilities.

Cloud Solutions

Major cloud providers offering virtual machines or services utilizing TEE hardware.

Blockchain Applications & Use Cases

Examples of how TEEs are being used or proposed within the blockchain ecosystem.

Code Repositories

Software related to TEEs in the context of blockchain, libraries, and example implementations.

Rust

Go

  • google/go-tpm-tools - Go packages built on go-tpm providing a high-level API for using TPMs.
  • google/go-sev-guest - Library to wrap the /dev/sev-guest device in Linux, as well as a library for attestation verification of fundamental components of an attestation report.
  • google/go-tdx-guest - Library to wrap the /dev/tdx-guest device in Linux, as well as a library for attestation verification of fundamental components of an attestation quote.
  • matter-labs/vault-auth-tee - Hashicorp Vault plugin for authenticating Trusted Execution Environments (TEE) like SGX enclaves.
  • usbarmory/GoTEE - Go Trusted Execution Environment (TEE).
  • iotexproject/w3bstream - An offchain computing layer for DePIN verifiable data computation, supporting a variety of validity proofs including Zero Knowledge (ZK), Trusted Execution Environments (TEE), and Multi-party Computation (MPC).
  • oasisprotocol/oasis-core - Performant and Confidentiality-Preserving Smart Contracts + Blockchains.
  • hyperledger/fabric-private-chaincode - FPC enables Confidential Chaincode Execution for Hyperledger Fabric using Intel SGX.
  • Microsoft/confidential-container-demos - Demos for running containers in confidential environments on Azure.

CPP

  • intel/linux-sgx - Intel SGX SDK and Platform Software (PSW) for Linux.
  • NixOS/nix - Nix, the purely functional package manager.
  • microsoft/azure-tee-attestation-samples - Trusted Execution Environment examples leveraging attestations on Azure.
  • lsds/Teechain - Teechain: A Secure Payment Network with Asynchronous Blockchain Access.
  • skalenetwork/sgxwallet - Opensource high-performance hardware secure crypto wallet that is based on Intel SGX technology. First opensource product on Intel SGX whitelist. Scales to 100,000+ transactions per second. Currently supports ETH and SKALE, and will support BTC in the future. Sgxwallet is under heavy development and use by SKALE network.
  • hyperledger-labs/private-data-objects - The Private Data Objects lab provides technology for confidentiality-preserving, off-chain smart contracts.

C

Others

Major TEE Attacks

Documented attacks or attack vectors on TEEs. List is WIP.

Classes: TE – transient/speculative; MDS – microarchitectural data sampling; FI – fault injection; AL – architectural leakage; PR – protocol/design.

Year Name Class Affected TEEs CVE(s) Summary Key Mitigations
2018 Foreshadow / L1TF TE Intel SGX, VMs, OS kernels CVE‑2018‑3615, CVE‑2018‑3620, CVE‑2018‑3646 Read enclave/VM/kernel secrets via L1D leaks Microcode updates, L1D flush on enclave transitions, OS patches, SGX TCB recovery
2018 SEVered PR / VM isolation AMD SEV (pre‑SNP) 1812.01129 Malicious hypervisor remaps guest pages to exfiltrate plaintext Move to SEV‑SNP (integrity protection), stronger guest validation
2019 MDS family (RIDL, Fallout, ZombieLoad) MDS / TE Intel SGX, VMs CVE‑2018‑12126, CVE‑2018‑12127, CVE‑2018‑12130, CVE‑2019‑11091 Leakage from CPU buffers into enclaves/VMs Microcode buffer clearing, stronger serialization, sometimes disable HT
2019 Plundervolt FI Intel SGX CVE‑2019‑11157 Software‑controlled undervolting corrupts enclave computation & leaks secrets Lock MSR undervolt interface (uCode), disable voltage control, protocol‑level FI checks
2019 TSX Asynchronous Abort (TAA) TE / MDS Intel SGX, VMs CVE‑2019‑11135 Additional transient leaks tied to TSX Microcode, disable TSX, serialize on transitions
2019 SGX-Step SC / Tooling Intel SGX 1611.06952 Fine‑grained interrupting boosts side‑channel resolution Rate‑limit interrupts, constant‑time/data‑oblivious coding
2020 Load Value Injection (LVI) TE Intel SGX CVE‑2020‑0551 Inject values into victim’s transient path Compiler‑inserted LFENCEs/serialization; Intel LVI toolchain
2020 CacheOut MDS / TE Intel SGX CVE‑2020‑0549 Extract data from L1D despite prior mitigations Stronger L1D flush/serialization; enclave transition hardening
2020 CrossTalk MDS Intel SGX CVE‑2020‑0543 Cross‑core leakage via shared buffers Microcode fixes; synchronization/isolation
2022 ÆPIC Leak AL Intel SGX CVE‑2022‑21233 Architectural leak of stale data via APIC MMIO (no speculation) Microcode/firmware updates, sanitize APIC reads, kernel patches
2023 Downfall / Gather Data Sampling (GDS) TE Intel SGX, VMs CVE‑2022‑40982 GATHER instruction leaks vector register data Microcode; serialization barriers; toolchain guidance
2023 Inception / Phantom Speculation (AMD) TE AMD SEV/SNP (indirectly affects CC VMs) CVE‑2023‑20569 Speculation attack on Zen CPUs Microcode/firmware updates; speculation barriers

Social Media & Community

TEEs on social media.

Additional Resources

About

A curated list of resources for learning about Trusted Execution Environments (TEEs) in the context of blockchains.

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published