Abstract
AbstractIn modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine. However, the hypervisor does not protect tenants against the cloud provider and thus, the supplied operating system and hardware. Intel SGX provides a mechanism that addresses this scenario. It aims at protecting user-level software from attacks from other processes, the operating system, and even physical attackers.In this paper, we demonstrate fine-grained software-based side-channel attacks from a malicious SGX enclave targeting co-located enclaves. Our attack is the first malware running on real SGX hardware, abusing SGX protection features to conceal itself. Furthermore, we demonstrate our attack both in a native environment and across multiple Docker containers. We perform a Prime+Probe cache side-channel attack on a co-located SGX enclave running an up-to-date RSA implementation that uses a constant-time multiplication primitive. The attack works, although in SGX enclaves, there are no timers, no large pages, no physical addresses, and no shared memory. In a semi-synchronous attack, we extract 96 % of an RSA private key from a single trace. We extract the full RSA private key in an automated attack from 11 traces within 5 min.
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference87 articles.
1. Acıiçmez, O, Schindler W (2008) A vulnerability in rsa implementations due to instruction cache analysis and its demonstration on openssl In: CT-RSA 2008. https://doi.org/10.1007/978-3-540-79263-5_16.
2. Allan, T, Brumley BB, Falkner K, Pol JVD, Yarom Y (2015) Amplifying Side Channels Through Performance Degradation. Cryptology ePrint Archive: Report 2015/1141. https://doi.org/10.1145/2991079.2991084.
3. Anati, I, McKeen F, Gueron S, Huang H, Johnson S, Leslie-Hurd R, Patil H, Rozas CV, Shafi H (2015) Intel Software Guard Extensions (Intel SGX). Tutorial Slides presented at ICSA 2015. https://sgxisca.weebly.com/.
4. ARMmbed (2016) Reduce mbed TLS memory and storage footprint. https://tls.mbed.org/kb/how-to/reduce-mbedtls-memory-and-storage-footprint. Accessed 24 Oct 2016.
5. Arnaud, C, Fouque P-A (2013) Timing attack against protected rsa-crt implementation used in polarssl In: CT-RSA 2013. https://doi.org/10.1007/978-3-642-36095-4_2.
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献