Detecting Privileged Side-Channel Attacks in Shielded Execution with Deja Vu

被引:115
作者
Chen, Sanchuan [1 ]
Zhang, Xiaokuan [1 ]
Reiter, Michael K. [2 ]
Zhang, Yinqian [1 ]
机构
[1] Ohio State Univ, Columbus, OH 43210 USA
[2] Univ N Carolina, Chapel Hill, NC 27515 USA
来源
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17) | 2017年
基金
美国国家科学基金会;
关键词
side-channel detection; Software Guard Extension; Transactional Synchronization Extensions;
D O I
10.1145/3052973.3053007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intel Software Guard Extension (SGX) protects the confidentiality and integrity of an unprivileged program running inside a secure enclave from a privileged attacker who has full control of the entire operating system (OS). Program execution inside this enclave is therefore referred to as shielded. Unfortunately, shielded execution does not protect programs from side-channel attacks by a privileged attacker. For instance, it has been shown that by changing page table entries of memory pages used by shielded execution, a malicious OS kernel could observe memory page accesses from the execution and hence infer a wide range of sensitive information about it. In fact, this page-fault side channel is only an instance of a category of side-channel attacks, here called privileged side-channel attacks, in which privileged attackers frequently preempt the shielded execution to obtain fine-grained side-channel observations. In this paper, we present Deja Vu, a software framework that enables a shielded execution to detect such privileged side-channel attacks. Specifically, we build into shielded execution the ability to check program execution time at the granularity of paths in its control-flow graph. To provide a trustworthy source of time measurement, Deja Vu implements a novel software reference clock that is protected by Intel Transactional Synchronization Extensions (TSX), a hardware implementation of transactional memory. Evaluations show that Deja Vu effectively detects side-channel attacks against shielded execution and against the reference clock itself.
引用
收藏
页码:7 / 18
页数:12
相关论文
共 57 条
[1]  
Acilcmez O., 2007, 2007 ACM WORKSH COMP
[2]  
[Anonymous], 2007, 34 ANN INT S COMP AR
[3]  
[Anonymous], 2014, 2014 USENIX ANN TECH
[4]  
[Anonymous], 2015, 22 ACM C COMP COMM S
[5]   Shielding Applications from an Untrusted Cloud with Haven [J].
Baumann, Andrew ;
Peinado, Marcus ;
Hunt, Galen .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2015, 33 (03)
[6]  
Checkoway S., 2013, 18 INT C ARCH SUPP P
[7]  
Chen H., 2007, TECHNICAL REPORT
[8]  
Chen X., 13 INT C ARCH SUPP P, P2
[9]  
Cheng Y., 2013, TECHNICAL REPORT
[10]  
Chomput J. V., 2012, ACM T ARCHIT CODE OP, V8