Hacker News new | past | comments | ask | show | jobs | submit login

This would still break SGX/remote attestation, no? The chip can correctly say it's running some piece of assembly but if "ret" has been redefined to do whatever I want...



The keys are stripped out if you put it into the required unlock mode.


That would be a good thing, given what those features are usually used for (DRM and other user-hostility).


I would love ability to redefine call/ret to profile an app without compiler generate diff code.


Can’t you do that through ebpf?


My understand of ebpf can hook into the function calls in linux kernel.

Can one do that on user space app?


Yes, that is my understanding.


This is what I'm interested in since they pushed that so heavily.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: