Secure Kernel Execution with Intel SGX

  • Bruno Meneguele UTFPR
  • Keiko Fonseca UTFPR
  • Marcelo Rosa UTFPR


Intel SGX is not accessible from the most privileged execution level, known as ring zero, where the operating system kernel is placed. However, it is possible to split the execution responsibility between kernel and userspace by creating a dependency among these two levels that allow internal kernel data to be stored or processed within SGX private enclaves. In this paper we present SKEEN, an enhanced way to isolate internal operating system components and structures with Intel SGX technology, preventing information leak to different components of the same operating system. A proof-of-concept is provided to exemplify its usage.

Palavras-chave: Intel SGX, Operating System, Linux Kernel, Isolation.


M. K. McKusick, G. Neville-Neil, and R. N. Watson,The Design andImplementation of the FreeBSD Operating System, 2nd ed.Addison-Wesley Professional, 2014.

S. Arnautov, B. Trach, F. Gregor, T. Knauth, A. Martin, C. Priebe,J. Lind, D. Muthukumaran, D. O’Keeffe, M. L. Stillwell, D. Goltzsche, D. Eyers, R. Kapitza, P. Pietzuch, and C. Fetzer,“SCONE: Securelinux containers with intel SGX,” in 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). Savannah,GA: USENIX Association, November 2016, pp.689–703. [Online]. Available:

Red Hat Inc, “What is virtualization,” 2019. [Online]. Available:

European Union Agency for Network and Information Security, “Security aspects of virtualization,” ENISA, Tech. Rep., February 2017.

M. Sabt, M. Achemlal, and A. Bouabdallah, “Trusted execution environment: What it is, and what it is not,” in 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, Aug 2015, pp. 57–64.

Intel Corporation, Intel®64 and IA-32 Architecutres Software Developer’s Manual, Volume 3D: System Programming Guide, Part 4, October2019. [Online]. Available:

L. Richter, J. Götzfried, and T. Müller, “Isolatingoperating systemcomponents with intel sgx,” in Proceedings of the 1st Workshop on System Software for Trusted Execution, ser. SysTEX ’16.NewYork, NY, USA: ACM, 2016, pp. 8:1–8:6. [Online]. Available:

F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar, “Innovative instructionsand software model for isolated execution,” in Proceedings ofthe 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, ser. HASP ’13.New York,NY, USA: ACM, 2013, pp. 10:1–10:1. [Online]. Available:

Intel Corporation, Intel®64 and IA-32 Architecutres Software Developer’s Manual, Volume3C: System Programming Guide, Part 3, October 2019. [Online]. Available:

M. Jones, “Invoking user-space applications from the kernel,“ February 2010. [Online]. Available:

H. Raj, S.Saroiu, A. Wolman, R. Aigner, J. Cox, P. England,C. Fenner, K. Kinshumann, J. Loeser, D. Mattoon, M. Nystrom,D. Robinson, R. Spiger, S. Thom, and D. Wooten, “ftpm: A software only implementation of a tpm chip,” in USENIX Security, August 2016. [Online]. Available:

Trusted Computing Group, “Tpm2.0-abriefintroduction,” 2019. [Online]. Available:

IMA Project, “Integrity measurement architecture wiki,” August 2020. [Online]. Available:, “Trusted and encrypted keys,” 2020. [Online]. Available:

Intel Corporation,“L1 Terminal Fault,” October 2018. [Online]. Available:

N. Brown, “Fast interprocess communication revisited,” November 2011. [Online]. Available:

NetOS Group, “ipc-bench: A unix inter-process communication benchmark,” November 2019. [Online]. Available:

Intel Corporation, Intel® Trusted Execution Technology (Intel TXT), Software Developement Guide, Measured Launched Environment, December 2019. [Online]. Available:, “Linux userspace seccomp manpage,” 2019. [Online]. Available:
Como Citar

Selecione um Formato
MENEGUELE, Bruno; FONSECA, Keiko; ROSA, Marcelo. Secure Kernel Execution with Intel SGX. In: TRABALHOS EM ANDAMENTO - SIMPÓSIO BRASILEIRO DE ENGENHARIA DE SISTEMAS COMPUTACIONAIS (SBESC), 10. , 2020, Evento Online. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2020 . p. 168-173. DOI: