Skip to content
A Framework for Universal Secure Computing
Branch: master
Clone or download
yulongzhang and mesatee-mergebot Sync with upstream crates-sgx (#6)
* Sync with upstream crates-sgx
* Merge branch 'master' into yulong/add_assert_matches
Latest commit 722e71f Jul 15, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Initial commit Jul 8, 2019
auditors Initial commit Jul 8, 2019
cert Initial commit Jul 8, 2019
cmake Initial commit Jul 8, 2019
docs Initial commit Jul 8, 2019
examples Initial commit Jul 8, 2019
mesatee_binder Initial commit Jul 8, 2019
mesatee_config Initial commit Jul 8, 2019
mesatee_core Initial commit Jul 8, 2019
mesatee_sdk Initial commit Jul 8, 2019
mesatee_services Upgrade dependencies. Pin ring on tag v0.14.6 (#2) Jul 10, 2019
tests Initial commit Jul 8, 2019
third_party Sync with upstream crates-sgx (#6) Jul 15, 2019
toolchain_deps Upgrade dependencies. Pin ring on tag v0.14.6 (#2) Jul 10, 2019
.bulldozer.yml Update CI and bulldozer config to properly handle PR (#5) Jul 15, 2019
.drone.yml Update CI and bulldozer config to properly handle PR (#5) Jul 15, 2019
.editor_config Initial commit Jul 8, 2019
.gitattributes Initial commit Jul 8, 2019
.gitignore Initial commit Jul 8, 2019
.gitmodules Initial commit Jul 8, 2019
CMakeLists.txt Initial commit Jul 8, 2019
CODE_OF_CONDUCT.md Initial commit Jul 8, 2019
Dockerfile Initial commit Jul 8, 2019
LICENSE
MAINTAINERS.md Initial commit Jul 8, 2019
Makefile Initial commit Jul 8, 2019
README.md Initial commit Jul 8, 2019
build.toml Initial commit Jul 8, 2019
config.toml Initial commit Jul 8, 2019
environment Initial commit Jul 8, 2019
service.sh Initial commit Jul 8, 2019

README.md

A Framework for Universal Secure Computing

Build Status Documentation Status Codecov Status License

Highlights

  • MesaTEE is the next-gen solution to enable general computing service for security-critical scenarios. It will allow even the most sensitive data to be securely processed to enable offshore businesses without leakage.

  • The solution combines the advanced Hybrid Memory Safety (HMS) model and the power of the Trusted Computing technologies (e.g. TPM) as well as the Confidential Computing technologies (e.g. Intel® SGX).

What Is MesaTEE?

The emerging technologies of big data analytics, machine learning, cloud/edge computing, and blockchain are significantly boosting our productivity, but at the same time they are bringing new confidentiality and integrity concerns. On public cloud and blockchain, sensitive data like health and financial records may be consumed at runtime by untrusted computing processes running on compromised platforms; during inhouse data exchange, confidential information may cross different clearance boundaries and possibly fall into the wrong hands; also not to mention the privacy issue arises in offshore data supply chains.

Although the consequences of data breaching have been extensively elaborated, we should also note that proprietary computing algorithms themselves, such as AI models, also need to be well protected. Once leaked, attackers can steal the intellectual properties, or launch whitebox attacks and easily exploit the weakness of the models.

Facing all these risky scenarios, we are in desperate need of a trusted and secure mechanism, enabling us to protect both private data and proprietary computing models during a migratable execution in potentially unsafe environments, yet preserving functionalities, performance, compatibility, and flexibility. MesaTEE is targeting to be, as we call it, the full “Universal Secure Computing” stack, so it can help users resolve these runtime security risks.

Figure 1: MesaTEE stack redefines future AI and big data analytics by providing a trusted and secure offshore computing environment. The confidentiality and integrity of both data and code can be well protected even if clients and service/platform providers do not trust each other.

As illustrated in the Figure 1, the confidentiality and privacy of data and models can be well protected with MesaTEE, even if data and model originate from different parties with no mutual trust. Moreover, the computing platform itself is not necessarily trusted either. The Trusted Computing Base (TCB) can thus be largely reduced to MesaTEE framework alone.

More details can be found in the following documents:

Getting Started

Contributing

The open-source version of MesaTEE is a prototype. The code is constantly evolving and designed to demonstrate types of functionality.

We still have lots of working-in-progress tasks. We are very happy if you are interested to submit pull requests. Please refer to Issues to help out or report new bugs/suggestions.

Please adhere to the Rust Development Guideline and remember to make format before submitting PRs.

Sibling Projects

Contact

We encourage you to discuss open source related matters in Issues. For other questions, you may reach out to MesaTEE mailing list: developers@mesatee.org or each maintainer individually.

You can’t perform that action at this time.