Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX - PubMed Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2017 Oct-Nov:2017:2421-2434.
doi: 10.1145/3133956.3134038.

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX

Affiliations

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX

Wenhao Wang et al. Conf Comput Commun Secur. 2017 Oct-Nov.

Abstract

Side-channel risks of Intel's SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the page-level access patterns of a protected process running in an SGX enclave. With almost all proposed defense focusing on this attack, little is known about whether such efforts indeed raises the bar for the adversary, whether a simple variation of the attack renders all protection ineffective, not to mention an in-depth understanding of other attack surfaces in the SGX system. In the paper, we report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. Our research identifies 8 potential attack vectors, ranging from TLB to DRAM modules. More importantly, we highlight the common misunderstandings about SGX memory side channels, demonstrating that high frequent AEXs can be avoided when recovering EdDSA secret key through a new page channel and fine-grained monitoring of enclave programs (at the level of 64B) can be done through combining both cache and cross-enclave DRAM channels. Our findings reveal the gap between the ongoing security research on SGX and its side-channel weaknesses, redefine the side-channel threat model for secure enclaves, and can provoke a discussion on when to use such a system and how to use it securely.

PubMed Disclaimer

Figures

Fig. 1.
Fig. 1.
Page table entries.
Fig. 2.
Fig. 2.
Basic SPM attack.
Fig. 3.
Fig. 3.
An example of secret-dependent branch leaking timing information.
Fig. 4.
Fig. 4.
Scalar point multiplication for ECC.
Fig. 5.
Fig. 5.
Illustration of cache-DRAM attack.
Fig. 6.
Fig. 6.
Distribution of access latency for probing the same row and a different row.
Fig. 7.
Fig. 7.
An input-dependent branch in Gap 4.8.6.

Similar articles

Cited by

References

    1. Intel software guard extensions programming reference. https://software.intel.com/sites/default/files/managed/48/88/329298-002...., 2014. Order Number: 329298-002, October 2014.
    1. Intel software guard extensions (intel sgx. https://software.intel.com/sites/default/files/332680-001.pdf, 2015 June 2015.
    1. Intel 64 and IA-32 architectures software developer’s manual, combined volumes:1,2A,2B,2C,3A,3B,3C and 3D. https://software.intel.com/sites/default/files/managed/3 9/c5/325 4 62-s..., 2016. Order Number: 325462-061US, December 2016.
    1. Intel 64 and IA-32 architectures software developer’s manual, combined volumes:1,2A,2B,2C,3A,3B,3C and 3D, 2016. Order Number: 325462-058US April 2016.
    1. Graphene / graphene-sgx library os - a library os for linux multi-process applications, with intel sgx support. https://github.com/oscarlab/graphene/, 2017. Accessed May 16, 2017.

LinkOut - more resources