Smile: Secure Memory Introspection for Live Enclave

2022 IEEE Symposium on Security and Privacy (SP)(2022)

引用 7|浏览13
暂无评分
摘要
SGX enclaves prevent external software from accessing their memory. This feature conflicts with legitimate needs for enclave memory introspection, e.g., runtime stack collection on an enclave under a return-oriented-programming attack. We propose SMILE for enclave owners to acquire live enclave contents with the assistance of a semi-trusted agent installed by the host platform’s vendor as a plug-in of the System Management Interrupt handler. SMILE authenticates the enclave under introspection without trusting the kernel nor depending on the SGX attestation facility. SMILE is enclave security preserving as breaking of SMILE does not undermine enclave security. It allows a cloud server to provide the enclave introspection service. We have implemented a SMILE prototype and run various experiments to read enclave code, heap, stack and SSA frames. The total cost for introspecting one page is less than 300 microseconds.
更多
查看译文
关键词
runtime stack collection,return-oriented-programming attack,enclave owners,live enclave contents,host platform,SGX attestation facility,enclave security,enclave introspection service,SMILE prototype,enclave code,secure memory introspection,external software,feature conflicts,system management interrupt handler,SSA frames,semitrusted agent,cloud server
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要