diff --git a/README.md b/README.md index 6082e41..7f4a7a1 100644 --- a/README.md +++ b/README.md @@ -54,7 +54,7 @@ wasm-ld --no-entry --export-all xxx.o --allow-undefined wasm2wat xxx.wasm -o xxx.wat ``` -We have successfully compiled several benchmarks, which can be found in the `Benchmarks/` directory. +We have successfully compiled several benchmarks, which can be found in the `benchmarks/` directory. ## Analysis @@ -63,14 +63,14 @@ We have successfully compiled several benchmarks, which can be found in the `Ben Our tool can be used by executing the `main.py` with the appropriate parameters. Three arguments are required. The first argument is the name of the wasm file to analyze. The second argument is the ECall list of the program, separated by commas (`,`). The third argument, which is optional, is the function list of the wasm file. If a corresponding wat file exists in the same path as the wasm file, the third argument can be omitted. For instance, to analyze the `sgx-dent` program for 12 hours, execute the following command: ```shell -python3 main.py -f Benchmarks/dnet.wasm --ecall-list sgx_empty_ecall,sgx_ecall_trainer,sgx_ecall_tester,sgx_ecall_classify --symgx --max-time 43200 +python3 main.py -f benchmarks/dnet.wasm --ecall-list sgx_empty_ecall,sgx_ecall_trainer,sgx_ecall_tester,sgx_ecall_classify --symgx --max-time 43200 ``` It is worth noting that although we set the `--ecall-list` and `--func-list` manually, they can be automatically obtained using automated tools. However, as this is not the primary focus of this project, we leave it for future work. ### Script -To facilitate a more convenient analysis of the samples in the `Benchmarks/` directory, we have provided a script. You can analyze benchmarks by executing the script with the name of the program you wish to analyze. For instance, to analyze the `sgx-dent` program, use the following command: +To facilitate a more convenient analysis of the samples in the `benchmarks/` directory, we have provided a script. You can analyze benchmarks by executing the script with the name of the program you wish to analyze. For instance, to analyze the `sgx-dent` program, use the following command: ```shell ./run.sh sgx-dnet --max-time 43200 diff --git a/Benchmarks/CE.wasm b/benchmarks/CE.wasm similarity index 100% rename from Benchmarks/CE.wasm rename to benchmarks/CE.wasm diff --git a/Benchmarks/bi2.wasm b/benchmarks/bi2.wasm similarity index 100% rename from Benchmarks/bi2.wasm rename to benchmarks/bi2.wasm diff --git a/Benchmarks/bi2.wat b/benchmarks/bi2.wat similarity index 100% rename from Benchmarks/bi2.wat rename to benchmarks/bi2.wat diff --git a/Benchmarks/dnet.wasm b/benchmarks/dnet.wasm similarity index 100% rename from Benchmarks/dnet.wasm rename to benchmarks/dnet.wasm diff --git a/Benchmarks/dnet.wat b/benchmarks/dnet.wat similarity index 100% rename from Benchmarks/dnet.wat rename to benchmarks/dnet.wat diff --git a/Benchmarks/isdl.wasm b/benchmarks/isdl.wasm similarity index 100% rename from Benchmarks/isdl.wasm rename to benchmarks/isdl.wasm diff --git a/Benchmarks/isdl.wat b/benchmarks/isdl.wat similarity index 100% rename from Benchmarks/isdl.wat rename to benchmarks/isdl.wat diff --git a/Benchmarks/kmeans.wasm b/benchmarks/kmeans.wasm similarity index 100% rename from Benchmarks/kmeans.wasm rename to benchmarks/kmeans.wasm diff --git a/Benchmarks/kmeans.wat b/benchmarks/kmeans.wat similarity index 100% rename from Benchmarks/kmeans.wat rename to benchmarks/kmeans.wat diff --git a/Benchmarks/pw.wasm b/benchmarks/pw.wasm similarity index 100% rename from Benchmarks/pw.wasm rename to benchmarks/pw.wasm diff --git a/Benchmarks/pw.wat b/benchmarks/pw.wat similarity index 100% rename from Benchmarks/pw.wat rename to benchmarks/pw.wat diff --git a/Benchmarks/reencrypt.wasm b/benchmarks/reencrypt.wasm similarity index 100% rename from Benchmarks/reencrypt.wasm rename to benchmarks/reencrypt.wasm diff --git a/Benchmarks/rsa.wasm b/benchmarks/rsa.wasm similarity index 100% rename from Benchmarks/rsa.wasm rename to benchmarks/rsa.wasm diff --git a/Benchmarks/rsa.wat b/benchmarks/rsa.wat similarity index 100% rename from Benchmarks/rsa.wat rename to benchmarks/rsa.wat diff --git a/Benchmarks/sgxcrypto.wasm b/benchmarks/sgxcrypto.wasm similarity index 100% rename from Benchmarks/sgxcrypto.wasm rename to benchmarks/sgxcrypto.wasm diff --git a/Benchmarks/sgxcrypto.wat b/benchmarks/sgxcrypto.wat similarity index 100% rename from Benchmarks/sgxcrypto.wat rename to benchmarks/sgxcrypto.wat diff --git a/Benchmarks/sl.wasm b/benchmarks/sl.wasm similarity index 100% rename from Benchmarks/sl.wasm rename to benchmarks/sl.wasm diff --git a/Benchmarks/sl.wat b/benchmarks/sl.wat similarity index 100% rename from Benchmarks/sl.wat rename to benchmarks/sl.wat diff --git a/Benchmarks/spf.wasm b/benchmarks/spf.wasm similarity index 100% rename from Benchmarks/spf.wasm rename to benchmarks/spf.wasm diff --git a/Benchmarks/spf.wat b/benchmarks/spf.wat similarity index 100% rename from Benchmarks/spf.wat rename to benchmarks/spf.wat diff --git a/Benchmarks/sse.wasm b/benchmarks/sse.wasm similarity index 100% rename from Benchmarks/sse.wasm rename to benchmarks/sse.wasm diff --git a/Benchmarks/sse.wat b/benchmarks/sse.wat similarity index 100% rename from Benchmarks/sse.wat rename to benchmarks/sse.wat diff --git a/Benchmarks/ve.wasm b/benchmarks/ve.wasm similarity index 100% rename from Benchmarks/ve.wasm rename to benchmarks/ve.wasm diff --git a/Benchmarks/ve.wat b/benchmarks/ve.wat similarity index 100% rename from Benchmarks/ve.wat rename to benchmarks/ve.wat diff --git a/Benchmarks/wallet.wasm b/benchmarks/wallet.wasm similarity index 100% rename from Benchmarks/wallet.wasm rename to benchmarks/wallet.wasm diff --git a/Benchmarks/wallet.wat b/benchmarks/wallet.wat similarity index 100% rename from Benchmarks/wallet.wat rename to benchmarks/wallet.wat diff --git a/run.sh b/run.sh index 0fd0651..deebd65 100755 --- a/run.sh +++ b/run.sh @@ -1,29 +1,29 @@ if [ "$1" = "sgx-dnet" ]; then - python3 main.py -f Benchmarks/dnet.wasm --ecall-list sgx_empty_ecall,sgx_ecall_trainer,sgx_ecall_tester,sgx_ecall_classify --symgx "${@:2}" + python3 main.py -f benchmarks/dnet.wasm --ecall-list sgx_empty_ecall,sgx_ecall_trainer,sgx_ecall_tester,sgx_ecall_classify --symgx "${@:2}" elif [ "$1" = "sgxwallet" ]; then - python3 main.py -f Benchmarks/wallet.wasm --ecall-list sgx_ecall_create_wallet,sgx_ecall_show_wallet,sgx_ecall_change_master_password --symgx "${@:2}" + python3 main.py -f benchmarks/wallet.wasm --ecall-list sgx_ecall_create_wallet,sgx_ecall_show_wallet,sgx_ecall_change_master_password --symgx "${@:2}" elif [ "$1" = "SGXCryptoFile" ]; then - python3 main.py -f Benchmarks/sgxcrypto.wasm --ecall-list sgx_sgxDecryptFile,sgx_sgxEncryptFile --symgx "${@:2}" + python3 main.py -f benchmarks/sgxcrypto.wasm --ecall-list sgx_sgxDecryptFile,sgx_sgxEncryptFile --symgx "${@:2}" elif [ "$1" = "verifiable-election" ]; then - python3 main.py -f Benchmarks/ve.wasm --ecall-list sgx_ecall_gen_credentials,sgx_ecall_unseal_and_export_pub,sgx_ecall_run_election,sgx_ecall_check_voter,sgx_ecall_type_char,sgx_ecall_type_int,sgx_ecall_type_float,sgx_ecall_type_double,sgx_ecall_type_size_t,sgx_ecall_type_wchar_t,sgx_ecall_type_struct,sgx_ecall_type_enum_union,sgx_ecall_pointer_user_check,sgx_ecall_pointer_in,sgx_ecall_pointer_out,sgx_ecall_pointer_in_out,sgx_ecall_pointer_string,sgx_ecall_pointer_string_const,sgx_ecall_pointer_size,sgx_ecall_pointer_count,sgx_ecall_pointer_isptr_readonly,sgx_ocall_pointer_attr,sgx_ecall_array_user_check,sgx_ecall_array_in,sgx_ecall_array_out,sgx_ecall_array_in_out,sgx_ecall_array_isary,sgx_ecall_function_public,sgx_ecall_function_private,sgx_ecall_malloc_free,sgx_ecall_sgx_cpuid,sgx_ecall_exception,sgx_ecall_map,sgx_ecall_increase_counter,sgx_ecall_producer,sgx_ecall_consumer --symgx "${@:2}" + python3 main.py -f benchmarks/ve.wasm --ecall-list sgx_ecall_gen_credentials,sgx_ecall_unseal_and_export_pub,sgx_ecall_run_election,sgx_ecall_check_voter,sgx_ecall_type_char,sgx_ecall_type_int,sgx_ecall_type_float,sgx_ecall_type_double,sgx_ecall_type_size_t,sgx_ecall_type_wchar_t,sgx_ecall_type_struct,sgx_ecall_type_enum_union,sgx_ecall_pointer_user_check,sgx_ecall_pointer_in,sgx_ecall_pointer_out,sgx_ecall_pointer_in_out,sgx_ecall_pointer_string,sgx_ecall_pointer_string_const,sgx_ecall_pointer_size,sgx_ecall_pointer_count,sgx_ecall_pointer_isptr_readonly,sgx_ocall_pointer_attr,sgx_ecall_array_user_check,sgx_ecall_array_in,sgx_ecall_array_out,sgx_ecall_array_in_out,sgx_ecall_array_isary,sgx_ecall_function_public,sgx_ecall_function_private,sgx_ecall_malloc_free,sgx_ecall_sgx_cpuid,sgx_ecall_exception,sgx_ecall_map,sgx_ecall_increase_counter,sgx_ecall_producer,sgx_ecall_consumer --symgx "${@:2}" elif [ "$1" = "sgx-log" ]; then - python3 main.py -f Benchmarks/sl.wasm --ecall-list sgx_process_log,sgx_verify_block_messages,sgx_generate_config,sgx_startup_phase,sgx_reset_block_key,sgx_ecall_type_char,sgx_ecall_type_int,sgx_ecall_type_float,sgx_ecall_type_double,sgx_ecall_type_size_t,sgx_ecall_type_wchar_t,sgx_ecall_type_struct,sgx_ecall_type_enum_union,sgx_ecall_pointer_user_check,sgx_ecall_pointer_in,sgx_ecall_pointer_out,sgx_ecall_pointer_in_out,sgx_ecall_pointer_string,sgx_ecall_pointer_string_const,sgx_ecall_pointer_size,sgx_ecall_pointer_count,sgx_ecall_pointer_isptr_readonly,sgx_ecall_pointer_sizefunc,sgx_ocall_pointer_attr,sgx_ecall_array_user_check,sgx_ecall_array_in,sgx_ecall_array_out,sgx_ecall_array_in_out,sgx_ecall_array_isary,sgx_ecall_function_calling_convs,sgx_ecall_function_public,sgx_ecall_function_private,sgx_ecall_malloc_free,sgx_ecall_sgx_cpuid,sgx_ecall_exception,sgx_ecall_map,sgx_ecall_increase_counter,sgx_ecall_producer,sgx_ecall_consumer,sgx_get_next_block_key,sgx_get_next_message_key,sgx_get_mac,sgx_hash,sgx_compareHashValues,sgx_reverse,sgx_itoa,sgx_myAtoi,sgx_get_hash,sgx_seal_data.126,sgx_seal_and_write --symgx "${@:2}" + python3 main.py -f benchmarks/sl.wasm --ecall-list sgx_process_log,sgx_verify_block_messages,sgx_generate_config,sgx_startup_phase,sgx_reset_block_key,sgx_ecall_type_char,sgx_ecall_type_int,sgx_ecall_type_float,sgx_ecall_type_double,sgx_ecall_type_size_t,sgx_ecall_type_wchar_t,sgx_ecall_type_struct,sgx_ecall_type_enum_union,sgx_ecall_pointer_user_check,sgx_ecall_pointer_in,sgx_ecall_pointer_out,sgx_ecall_pointer_in_out,sgx_ecall_pointer_string,sgx_ecall_pointer_string_const,sgx_ecall_pointer_size,sgx_ecall_pointer_count,sgx_ecall_pointer_isptr_readonly,sgx_ecall_pointer_sizefunc,sgx_ocall_pointer_attr,sgx_ecall_array_user_check,sgx_ecall_array_in,sgx_ecall_array_out,sgx_ecall_array_in_out,sgx_ecall_array_isary,sgx_ecall_function_calling_convs,sgx_ecall_function_public,sgx_ecall_function_private,sgx_ecall_malloc_free,sgx_ecall_sgx_cpuid,sgx_ecall_exception,sgx_ecall_map,sgx_ecall_increase_counter,sgx_ecall_producer,sgx_ecall_consumer,sgx_get_next_block_key,sgx_get_next_message_key,sgx_get_mac,sgx_hash,sgx_compareHashValues,sgx_reverse,sgx_itoa,sgx_myAtoi,sgx_get_hash,sgx_seal_data.126,sgx_seal_and_write --symgx "${@:2}" elif [ "$1" = "sgx-kmeans" ]; then - python3 main.py -f Benchmarks/kmeans.wasm --ecall-list sgx_secure_kmeans,sgx_seal,sgx_unseal --symgx "${@:2}" + python3 main.py -f benchmarks/kmeans.wasm --ecall-list sgx_secure_kmeans,sgx_seal,sgx_unseal --symgx "${@:2}" elif [ "$1" = "sgx-reencrypt" ]; then - python3 main.py -f Benchmarks/reencrypt.wasm --ecall-list sgx_generate_keypair,sgx_seal_keypair,sgx_unseal_keypair,sgx_reencrypt,sgx_register_key,__wasm_call_ctors,sgx_generate_keypair,generate_keypair,sgx_seal_keypair,seal_keypair,sgx_unseal_keypair,unseal_keypair,sgx_reencryt,reencrypt,sgx_register_key,register_key,untrusted_fs_store,untrusted_fs_load,untrusted_fs_free,time,seal,unseal,fs_store,fs_load,fs_free,unpack_request,key_serialize,key_deserialize,crypto_box_curve25519xsalsa20poly1305_tweet_keypair,set_keypair,unbox,put_key,box,check_policy,.Lunsafe_timestamp_bitcast,decrypt,encrypt,key_free,aes128gcm_plaintext_size,aes128gcm_decrypt,aes128gcm_ciphertext_size,aes128gcm_encrypt,authorized_from,authorized_to,get_key,authorized_clid,unsafe_timestamp,compute_key_id,blake2b_init,blake2b_update,blake2b_final,crypto_box_curve25519xsalsa20poly1305_tweet_open,crypto_box_curve25519xsalsa20poly1305_tweet,randombytes,blake2b_init_param,blake2b_init0,load64,store32,store64,blake2b_init_key,secure_zero_memory,blake2b_increment_counter,blake2b_compress,rotr64,blake2b_set_lastblock,blake2b_set_lastnode,blake2b,crypto_verify_16_tweet,vn,crypto_verify_32_tweet,crypto_core_salsa20_tweet,core,ld32,L32,st32,crypto_core_hsalsa20_tweet,crypto_stream_salsa20_tweet_xor,crypto_stream_salsa20_tweet,crypto_stream_xsalsa20_tweet,crypto_stream_xsalsa20_tweet_xor,crypto_onetimeauth_poly1305_tweet,add1305,crypto_onetimeauth_poly1305_tweet_verify,crypto_secretbox_xsalsa20poly1305_tweet,crypto_secretbox_xsalsa20poly1305_tweet_open,crypto_scalarmult_curve25519_tweet,unpack25519,sel25519,A,Z,S,M,inv25519,pack25519,car25519,crypto_scalarmult_curve25519_tweet_base,crypto_box_curve25519xsalsa20poly1305_tweet_beforenm,crypto_box_curve25519xsalsa20poly1305_tweet_afternm,crypto_box_curve25519xsalsa20poly1305_tweet_open_afternm,crypto_hashblocks_sha512_tweet,dl64,Sigma1,Ch,Sigma0,Maj,sigma0,sigma1,ts64,R,crypto_hash_sha512_tweet,crypto_sign_ed25519_tweet_keypair,scalarbase,pack,set25519,scalarmult,par25519,cswap,add,crypto_sign_ed25519_tweet,reduce,modL,crypto_sign_ed25519_tweet_open,unpackneg,pow2523,neq25519 --symgx "${@:2}" + python3 main.py -f benchmarks/reencrypt.wasm --ecall-list sgx_generate_keypair,sgx_seal_keypair,sgx_unseal_keypair,sgx_reencrypt,sgx_register_key,__wasm_call_ctors,sgx_generate_keypair,generate_keypair,sgx_seal_keypair,seal_keypair,sgx_unseal_keypair,unseal_keypair,sgx_reencryt,reencrypt,sgx_register_key,register_key,untrusted_fs_store,untrusted_fs_load,untrusted_fs_free,time,seal,unseal,fs_store,fs_load,fs_free,unpack_request,key_serialize,key_deserialize,crypto_box_curve25519xsalsa20poly1305_tweet_keypair,set_keypair,unbox,put_key,box,check_policy,.Lunsafe_timestamp_bitcast,decrypt,encrypt,key_free,aes128gcm_plaintext_size,aes128gcm_decrypt,aes128gcm_ciphertext_size,aes128gcm_encrypt,authorized_from,authorized_to,get_key,authorized_clid,unsafe_timestamp,compute_key_id,blake2b_init,blake2b_update,blake2b_final,crypto_box_curve25519xsalsa20poly1305_tweet_open,crypto_box_curve25519xsalsa20poly1305_tweet,randombytes,blake2b_init_param,blake2b_init0,load64,store32,store64,blake2b_init_key,secure_zero_memory,blake2b_increment_counter,blake2b_compress,rotr64,blake2b_set_lastblock,blake2b_set_lastnode,blake2b,crypto_verify_16_tweet,vn,crypto_verify_32_tweet,crypto_core_salsa20_tweet,core,ld32,L32,st32,crypto_core_hsalsa20_tweet,crypto_stream_salsa20_tweet_xor,crypto_stream_salsa20_tweet,crypto_stream_xsalsa20_tweet,crypto_stream_xsalsa20_tweet_xor,crypto_onetimeauth_poly1305_tweet,add1305,crypto_onetimeauth_poly1305_tweet_verify,crypto_secretbox_xsalsa20poly1305_tweet,crypto_secretbox_xsalsa20poly1305_tweet_open,crypto_scalarmult_curve25519_tweet,unpack25519,sel25519,A,Z,S,M,inv25519,pack25519,car25519,crypto_scalarmult_curve25519_tweet_base,crypto_box_curve25519xsalsa20poly1305_tweet_beforenm,crypto_box_curve25519xsalsa20poly1305_tweet_afternm,crypto_box_curve25519xsalsa20poly1305_tweet_open_afternm,crypto_hashblocks_sha512_tweet,dl64,Sigma1,Ch,Sigma0,Maj,sigma0,sigma1,ts64,R,crypto_hash_sha512_tweet,crypto_sign_ed25519_tweet_keypair,scalarbase,pack,set25519,scalarmult,par25519,cswap,add,crypto_sign_ed25519_tweet,reduce,modL,crypto_sign_ed25519_tweet_open,unpackneg,pow2523,neq25519 --symgx "${@:2}" elif [ "$1" = "CryptoEnclave" ]; then - python3 main.py -f Benchmarks/CE.wasm --ecall-list "sgx_dump_key,sgx_gen_key,sgx_gen_sha256,sgx_get_sha256,sgx_gen_hmac_sha256,sgx_get_hmac_sha256,sgx_encrypt_aes_cbc,sgx_decrypt_aes_cbc,sgx_encrypt_aes_ecb,sgx_decrypt_aes_ecb,sgx_oc_cpuidex,__wasm_call_ctors,sgx_dump_key,dump_key,sgx_gen_key,gen_key,sgx_gen_sha256,gen_sha256,sgx_get_sha256,get_sha256,sgx_gen_hmac_sha256,gen_hmac_sha256,sgx_get_hmac_sha256,get_hmac_sha256,sgx_encrypt_aes_cbc,encrypt_aes_cbc,sgx_decrypt_aes_cbc,decrypt_aes_cbc,sgx_encrypt_aes_ecb,encrypt_aes_ecb,sgx_decrypt_aes_ecb,decrypt_aes_ecb,print,sgx_oc_cpuidex,sgx_thread_wait_untrusted_event_ocall,sgx_thread_set_untrusted_event_ocall,sgx_thread_setwait_untrusted_events_ocall,sgx_thread_set_multiple_untrusted_events_ocall,printf\(char const*, ...\),zeromem\(void volatile*, unsigned long\),sha256_init\(Hash_state*\),sha256_process\(Hash_state*, unsigned char*, unsigned \),sha256_compress\(Hash_state*, unsigned char*\),sha256_done\(Hash_state*, unsigned char*\),sha256_test\(\),hash_memory\(int, unsigned char*, unsigned long, unsigned char*, unsigned long*\),hmac_init\(Hmac_state*, int, unsigned char*, unsigned long\),hmac_process\(Hmac_state*, unsigned char*, unsigned long\),hmac_done\(Hmac_state*, unsigned char*, unsigned long*\),SETUP\(unsigned char const*, unsigned long, int, Symmetric_key*\),ECB_ENC\(unsigned char const*, unsigned char*, Symmetric_key*\),ECB_DEC\(unsigned char const*, unsigned char*, Symmetric_key*\),cbc_start\(unsigned char*, unsigned char*, unsigned long, int, symmetric_CBC*\),setup_key\(unsigned char*, unsigned char*, unsigned long, int, symmetric_CBC*\),cbc_encrypt\(unsigned char const*, unsigned char*, unsigned long, symmetric_CBC*\),cbc_decrypt\(unsigned char const*, unsigned char*, unsigned long, symmetric_CBC*\)" --symgx "${@:2}" + python3 main.py -f benchmarks/CE.wasm --ecall-list "sgx_dump_key,sgx_gen_key,sgx_gen_sha256,sgx_get_sha256,sgx_gen_hmac_sha256,sgx_get_hmac_sha256,sgx_encrypt_aes_cbc,sgx_decrypt_aes_cbc,sgx_encrypt_aes_ecb,sgx_decrypt_aes_ecb,sgx_oc_cpuidex,__wasm_call_ctors,sgx_dump_key,dump_key,sgx_gen_key,gen_key,sgx_gen_sha256,gen_sha256,sgx_get_sha256,get_sha256,sgx_gen_hmac_sha256,gen_hmac_sha256,sgx_get_hmac_sha256,get_hmac_sha256,sgx_encrypt_aes_cbc,encrypt_aes_cbc,sgx_decrypt_aes_cbc,decrypt_aes_cbc,sgx_encrypt_aes_ecb,encrypt_aes_ecb,sgx_decrypt_aes_ecb,decrypt_aes_ecb,print,sgx_oc_cpuidex,sgx_thread_wait_untrusted_event_ocall,sgx_thread_set_untrusted_event_ocall,sgx_thread_setwait_untrusted_events_ocall,sgx_thread_set_multiple_untrusted_events_ocall,printf\(char const*, ...\),zeromem\(void volatile*, unsigned long\),sha256_init\(Hash_state*\),sha256_process\(Hash_state*, unsigned char*, unsigned \),sha256_compress\(Hash_state*, unsigned char*\),sha256_done\(Hash_state*, unsigned char*\),sha256_test\(\),hash_memory\(int, unsigned char*, unsigned long, unsigned char*, unsigned long*\),hmac_init\(Hmac_state*, int, unsigned char*, unsigned long\),hmac_process\(Hmac_state*, unsigned char*, unsigned long\),hmac_done\(Hmac_state*, unsigned char*, unsigned long*\),SETUP\(unsigned char const*, unsigned long, int, Symmetric_key*\),ECB_ENC\(unsigned char const*, unsigned char*, Symmetric_key*\),ECB_DEC\(unsigned char const*, unsigned char*, Symmetric_key*\),cbc_start\(unsigned char*, unsigned char*, unsigned long, int, symmetric_CBC*\),setup_key\(unsigned char*, unsigned char*, unsigned long, int, symmetric_CBC*\),cbc_encrypt\(unsigned char const*, unsigned char*, unsigned long, symmetric_CBC*\),cbc_decrypt\(unsigned char const*, unsigned char*, unsigned long, symmetric_CBC*\)" --symgx "${@:2}" elif [ "$1" = "sgx-pwenclave" ]; then - python3 main.py -f Benchmarks/pw.wasm --ecall-list sgx_pw_region_enroll,sgx_pw_setup,sgx_pw_check --symgx "${@:2}" + python3 main.py -f benchmarks/pw.wasm --ecall-list sgx_pw_region_enroll,sgx_pw_setup,sgx_pw_check --symgx "${@:2}" elif [ "$1" = "sgx-deep-learning" ]; then - python3 main.py -f Benchmarks/isdl.wasm --ecall-list sgx_ecall_train_network,sgx_ecall_test_network,sgx_ecall_thread_enter_enclave_waiting,sgx_ecall_build_network --symgx "${@:2}" + python3 main.py -f benchmarks/isdl.wasm --ecall-list sgx_ecall_train_network,sgx_ecall_test_network,sgx_ecall_thread_enter_enclave_waiting,sgx_ecall_build_network --symgx "${@:2}" elif [ "$1" = "sgx-biniax2" ]; then - python3 main.py -f Benchmarks/bi2.wasm --ecall-list sgx_init_store,sgx_free_store,sgx_add_to_store,sgx_get_from_store,sgx_encrypt_store,sgx_decrypt_store,sgx_store_to_bytes --symgx "${@:2}" + python3 main.py -f benchmarks/bi2.wasm --ecall-list sgx_init_store,sgx_free_store,sgx_add_to_store,sgx_get_from_store,sgx_encrypt_store,sgx_decrypt_store,sgx_store_to_bytes --symgx "${@:2}" elif [ "$1" = "sgx-rsa" ]; then - python3 main.py -f Benchmarks/rsa.wasm --ecall-list sgx_ecall_get_pubSize,sgx_ecall_gen_pubKey,sgx_ecall_get_prvSize,sgx_ecall_gen_prvKey,sgx_ecall_gen_scratchSize,sgx_ecall_encrypt,sgx_ecall_decryption,sgx_ecall_genKey,sgx_ecall_type_char,sgx_ecall_type_int,sgx_ecall_type_float,sgx_ecall_type_double,sgx_ecall_type_size_t,sgx_ecall_type_wchar_t,sgx_ecall_type_struct,sgx_ecall_type_enum_union,sgx_ecall_pointer_user_check,sgx_ecall_pointer_in,sgx_ecall_pointer_out,sgx_ecall_pointer_in_out,sgx_ecall_pointer_string,sgx_ecall_pointer_string_const,sgx_ecall_pointer_size,sgx_ecall_pointer_count,sgx_ecall_pointer_isptr_readonly,sgx_ocall_pointer_attr,sgx_ecall_array_user_check,sgx_ecall_array_in,sgx_ecall_array_out,sgx_ecall_array_in_out,sgx_ecall_array_isary,sgx_ecall_function_public,sgx_ecall_function_private,sgx_ecall_malloc_free,sgx_ecall_sgx_cpuid,sgx_ecall_exception,sgx_ecall_map,sgx_ecall_increase_counter,sgx_ecall_producer,sgx_ecall_consumer --symgx "${@:2}" + python3 main.py -f benchmarks/rsa.wasm --ecall-list sgx_ecall_get_pubSize,sgx_ecall_gen_pubKey,sgx_ecall_get_prvSize,sgx_ecall_gen_prvKey,sgx_ecall_gen_scratchSize,sgx_ecall_encrypt,sgx_ecall_decryption,sgx_ecall_genKey,sgx_ecall_type_char,sgx_ecall_type_int,sgx_ecall_type_float,sgx_ecall_type_double,sgx_ecall_type_size_t,sgx_ecall_type_wchar_t,sgx_ecall_type_struct,sgx_ecall_type_enum_union,sgx_ecall_pointer_user_check,sgx_ecall_pointer_in,sgx_ecall_pointer_out,sgx_ecall_pointer_in_out,sgx_ecall_pointer_string,sgx_ecall_pointer_string_const,sgx_ecall_pointer_size,sgx_ecall_pointer_count,sgx_ecall_pointer_isptr_readonly,sgx_ocall_pointer_attr,sgx_ecall_array_user_check,sgx_ecall_array_in,sgx_ecall_array_out,sgx_ecall_array_in_out,sgx_ecall_array_isary,sgx_ecall_function_public,sgx_ecall_function_private,sgx_ecall_malloc_free,sgx_ecall_sgx_cpuid,sgx_ecall_exception,sgx_ecall_map,sgx_ecall_increase_counter,sgx_ecall_producer,sgx_ecall_consumer --symgx "${@:2}" elif [ "$1" = "sgx_protect_file" ]; then - python3 main.py -f Benchmarks/spf.wasm --ecall-list sgx_ecall_encrypt_file,sgx_ecall_decrypt_file --symgx "${@:2}" + python3 main.py -f benchmarks/spf.wasm --ecall-list sgx_ecall_encrypt_file,sgx_ecall_decrypt_file --symgx "${@:2}" elif [ "$1" = "SGXSSE" ]; then - python3 main.py -f Benchmarks/sse.wasm --ecall-list sgx_ecall_init,sgx_ecall_query_keyword,sgx_ecall_update_doc --symgx "${@:2}" + python3 main.py -f benchmarks/sse.wasm --ecall-list sgx_ecall_init,sgx_ecall_query_keyword,sgx_ecall_update_doc --symgx "${@:2}" fi \ No newline at end of file