Table 1 provides an overview of publicly known SGX attacks, what information can be leaked using them, as well as the mitigation strategies for each attack technique. Finally, we also identify whether the responsibility lies with developer or Intel..
Relevance: 9.300919