We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hi, While doing genration based fuzzing on existing SGX programs, we found that SGX-LKL encalve does not do proper checking on the following fields:
The fuzzer works on the principle that arguments to enclave are coming from untrusted runtime and should be checked accordingly.
The text was updated successfully, but these errors were encountered:
This issue has security implication. Proposed to assign P1.
Sorry, something went wrong.
@Arslan8 Kudos to you and those involved. This is good work. Please keep it up.
wintersteiger
No branches or pull requests
Hi,
While doing genration based fuzzing on existing SGX programs, we found that SGX-LKL encalve does not do proper checking on the following fields:
The fuzzer works on the principle that arguments to enclave are coming from untrusted runtime and should be checked accordingly.
The text was updated successfully, but these errors were encountered: