SGAxe: How SGX Fails in Practice

user-5f8cf7e04c775ec6fa691c92(2020)

引用 33|浏览76
暂无评分
摘要
Intel’s Software Guard Extensions (SGX) promises an isolated execution environment, protected from all software running on the machine. A significant limitation of SGX is its lack of protection against side-channel attacks. In particular, recent works have shown that transient-execution attacks can leak arbitrary data from SGX, breaching SGX’s confidentiality. However, less work has been done on the implications of such attacks on the SGX ecosystems. In this work we start from CacheOut, a recent confidentiality attack on SGX, which allows the retrieval of an enclave’s memory contents. We show how CacheOut can be leveraged to compromise the confidentiality and the integrity of a victim enclave’s long-term storage. By using the extended attack against the Intel-provided and signed architectural SGX enclaves, we retrieve the secret attestation key used for cryptographically proving the genuinity of enclaves over the network, allowing us to pass fake enclaves as genuine. Finally, we analyze the impact of our attack on two proposed SGX applications, the Signal communication app and Town Crier, an SGX-based blockchain application.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要