Malware Guard Extension: abusing Intel SGX to conceal cache attacks

Author:

Schwarz MichaelORCID,Weiser Samuel,Gruss Daniel,Maurice Clémentine,Mangard Stefan

Abstract

AbstractIn modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine. However, the hypervisor does not protect tenants against the cloud provider and thus, the supplied operating system and hardware. Intel SGX provides a mechanism that addresses this scenario. It aims at protecting user-level software from attacks from other processes, the operating system, and even physical attackers.In this paper, we demonstrate fine-grained software-based side-channel attacks from a malicious SGX enclave targeting co-located enclaves. Our attack is the first malware running on real SGX hardware, abusing SGX protection features to conceal itself. Furthermore, we demonstrate our attack both in a native environment and across multiple Docker containers. We perform a Prime+Probe cache side-channel attack on a co-located SGX enclave running an up-to-date RSA implementation that uses a constant-time multiplication primitive. The attack works, although in SGX enclaves, there are no timers, no large pages, no physical addresses, and no shared memory. In a semi-synchronous attack, we extract 96 % of an RSA private key from a single trace. We extract the full RSA private key in an automated attack from 11 traces within 5 min.

Publisher

Springer Science and Business Media LLC

Subject

Artificial Intelligence,Computer Networks and Communications,Information Systems,Software

Reference87 articles.

1. Acıiçmez, O, Schindler W (2008) A vulnerability in rsa implementations due to instruction cache analysis and its demonstration on openssl In: CT-RSA 2008. https://doi.org/10.1007/978-3-540-79263-5_16.

2. Allan, T, Brumley BB, Falkner K, Pol JVD, Yarom Y (2015) Amplifying Side Channels Through Performance Degradation. Cryptology ePrint Archive: Report 2015/1141. https://doi.org/10.1145/2991079.2991084.

3. Anati, I, McKeen F, Gueron S, Huang H, Johnson S, Leslie-Hurd R, Patil H, Rozas CV, Shafi H (2015) Intel Software Guard Extensions (Intel SGX). Tutorial Slides presented at ICSA 2015. https://sgxisca.weebly.com/.

4. ARMmbed (2016) Reduce mbed TLS memory and storage footprint. https://tls.mbed.org/kb/how-to/reduce-mbedtls-memory-and-storage-footprint. Accessed 24 Oct 2016.

5. Arnaud, C, Fouque P-A (2013) Timing attack against protected rsa-crt implementation used in polarssl In: CT-RSA 2013. https://doi.org/10.1007/978-3-642-36095-4_2.

Cited by 48 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions;Cybersecurity;2024-08-04

2. Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains;IEEE Transactions on Cloud Computing;2024-04

3. Practical Deep Neural Network Protection for Unmodified Applications in Intel Software Guard Extension Environments;IFIP Advances in Information and Communication Technology;2023-12-29

4. SafeML: A Privacy-Preserving Byzantine-Robust Framework for Distributed Machine Learning Training;2023 IEEE International Conference on Data Mining Workshops (ICDMW);2023-12-04

5. Information Flow Tracking for Heterogeneous Compartmentalized Software;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3