Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
- PMID: 30853868
- PMCID: PMC6405214
- DOI: 10.1145/3133956.3134038
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Abstract
Side-channel risks of Intel's SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the page-level access patterns of a protected process running in an SGX enclave. With almost all proposed defense focusing on this attack, little is known about whether such efforts indeed raises the bar for the adversary, whether a simple variation of the attack renders all protection ineffective, not to mention an in-depth understanding of other attack surfaces in the SGX system. In the paper, we report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. Our research identifies 8 potential attack vectors, ranging from TLB to DRAM modules. More importantly, we highlight the common misunderstandings about SGX memory side channels, demonstrating that high frequent AEXs can be avoided when recovering EdDSA secret key through a new page channel and fine-grained monitoring of enclave programs (at the level of 64B) can be done through combining both cache and cross-enclave DRAM channels. Our findings reveal the gap between the ongoing security research on SGX and its side-channel weaknesses, redefine the side-channel threat model for secure enclaves, and can provoke a discussion on when to use such a system and how to use it securely.
Figures
Similar articles
-
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework.IEEE Int Conf Cloud Comput. 2021 Sep;2021:733-743. doi: 10.1109/CLOUD53861.2021.00098. Epub 2021 Nov 13. IEEE Int Conf Cloud Comput. 2021. PMID: 35662807 Free PMC article.
-
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.IEEE Trans Dependable Secure Comput. 2023 Jan-Feb;20(1):522-538. doi: 10.1109/tdsc.2021.3138427. Epub 2021 Dec 28. IEEE Trans Dependable Secure Comput. 2023. PMID: 38152698 Free PMC article.
-
eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology.Sensors (Basel). 2018 Nov 6;18(11):3807. doi: 10.3390/s18113807. Sensors (Basel). 2018. PMID: 30404242 Free PMC article.
-
Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methods.Sensors (Basel). 2024 Jan 17;24(2):592. doi: 10.3390/s24020592. Sensors (Basel). 2024. PMID: 38257684 Free PMC article. Review.
-
Store-Independent Orai Channels Regulated by STIM.In: Kozak JA, Putney JW Jr, editors. Calcium Entry Channels in Non-Excitable Cells. Boca Raton (FL): CRC Press/Taylor & Francis; 2018. Chapter 11. In: Kozak JA, Putney JW Jr, editors. Calcium Entry Channels in Non-Excitable Cells. Boca Raton (FL): CRC Press/Taylor & Francis; 2018. Chapter 11. PMID: 30299650 Free Books & Documents. Review.
Cited by
-
Practical and Efficient in-Enclave Verification of Privacy Compliance.Proc (Int Conf Dependable Syst Netw). 2021 Jun;2021:413-425. doi: 10.1109/dsn48987.2021.00052. Epub 2021 Aug 6. Proc (Int Conf Dependable Syst Netw). 2021. PMID: 35919377 Free PMC article.
-
Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation.JMIR Med Inform. 2018 Mar 5;6(1):e14. doi: 10.2196/medinform.8286. JMIR Med Inform. 2018. PMID: 29506966 Free PMC article.
-
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework.IEEE Int Conf Cloud Comput. 2021 Sep;2021:733-743. doi: 10.1109/CLOUD53861.2021.00098. Epub 2021 Nov 13. IEEE Int Conf Cloud Comput. 2021. PMID: 35662807 Free PMC article.
-
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.IEEE Trans Dependable Secure Comput. 2023 Jan-Feb;20(1):522-538. doi: 10.1109/tdsc.2021.3138427. Epub 2021 Dec 28. IEEE Trans Dependable Secure Comput. 2023. PMID: 38152698 Free PMC article.
-
Privacy-preserving genotype imputation in a trusted execution environment.Cell Syst. 2021 Oct 20;12(10):983-993.e7. doi: 10.1016/j.cels.2021.08.001. Epub 2021 Aug 26. Cell Syst. 2021. PMID: 34450045 Free PMC article.
References
-
- Intel software guard extensions programming reference. https://software.intel.com/sites/default/files/managed/48/88/329298-002...., 2014. Order Number: 329298-002, October 2014.
-
- Intel software guard extensions (intel sgx. https://software.intel.com/sites/default/files/332680-001.pdf, 2015 June 2015.
-
- Intel 64 and IA-32 architectures software developer’s manual, combined volumes:1,2A,2B,2C,3A,3B,3C and 3D. https://software.intel.com/sites/default/files/managed/3 9/c5/325 4 62-s..., 2016. Order Number: 325462-061US, December 2016.
-
- Intel 64 and IA-32 architectures software developer’s manual, combined volumes:1,2A,2B,2C,3A,3B,3C and 3D, 2016. Order Number: 325462-058US April 2016.
-
- Graphene / graphene-sgx library os - a library os for linux multi-process applications, with intel sgx support. https://github.com/oscarlab/graphene/, 2017. Accessed May 16, 2017.
Grants and funding
LinkOut - more resources
Full Text Sources
Other Literature Sources
Miscellaneous