Literature DB >> 30853868

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.

Wenhao Wang1, Guoxing Chen2, Xiaorui Pan1, Yinqian Zhang2, XiaoFeng Wang1, Vincent Bindschaedler2, Haixu Tang1, Carl A Gunter3.   

Abstract

Side-channel risks of Intel's SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the page-level access patterns of a protected process running in an SGX enclave. With almost all proposed defense focusing on this attack, little is known about whether such efforts indeed raises the bar for the adversary, whether a simple variation of the attack renders all protection ineffective, not to mention an in-depth understanding of other attack surfaces in the SGX system. In the paper, we report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. Our research identifies 8 potential attack vectors, ranging from TLB to DRAM modules. More importantly, we highlight the common misunderstandings about SGX memory side channels, demonstrating that high frequent AEXs can be avoided when recovering EdDSA secret key through a new page channel and fine-grained monitoring of enclave programs (at the level of 64B) can be done through combining both cache and cross-enclave DRAM channels. Our findings reveal the gap between the ongoing security research on SGX and its side-channel weaknesses, redefine the side-channel threat model for secure enclaves, and can provoke a discussion on when to use such a system and how to use it securely.

Entities:  

Year:  2017        PMID: 30853868      PMCID: PMC6405214          DOI: 10.1145/3133956.3134038

Source DB:  PubMed          Journal:  Conf Comput Commun Secur        ISSN: 1543-7221


  4 in total

1.  Practical and Efficient in-Enclave Verification of Privacy Compliance.

Authors:  Weijie Liu; Wenhao Wang; Hongbo Chen; XiaoFeng Wang; Yaosong Lu; Kai Chen; Xinyu Wang; Qintao Shen; Yi Chen; Haixu Tang
Journal:  Proc (Int Conf Dependable Syst Netw)       Date:  2021-08-06

2.  Privacy-preserving genotype imputation in a trusted execution environment.

Authors:  Natnatee Dokmai; Can Kockan; Kaiyuan Zhu; XiaoFeng Wang; S Cenk Sahinalp; Hyunghoon Cho
Journal:  Cell Syst       Date:  2021-08-26       Impact factor: 11.091

3.  HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework.

Authors:  Chathura Widanage; Weijie Liu; Jiayu Li; Hongbo Chen; XiaoFeng Wang; Haixu Tang; Judy Fox
Journal:  IEEE Int Conf Cloud Comput       Date:  2021-11-13

4.  Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation.

Authors:  Md Nazmus Sadat; Xiaoqian Jiang; Md Momin Al Aziz; Shuang Wang; Noman Mohammed
Journal:  JMIR Med Inform       Date:  2018-03-05
  4 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.