Tutorial: Uncovering and Mitigating Side-Channel Leakage in Intel SGX Enclaves

被引:0
|
作者
Van Bulck, Jo [1 ]
Piessens, Frank [1 ]
机构
[1] Katholieke Univ Leuven, imec DistriNet, Celestijnenlaan 200A, B-3001 Leuven, Belgium
来源
SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018 | 2018年 / 11348卷
基金
比利时弗兰德研究基金会;
关键词
Side-channel; Enclave; SGX; Tutorial;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inclusion of the Software Guard eXtensions (SGX) in recent Intel processors has been broadly acclaimed for bringing strong hardware-enforced trusted computing guarantees to mass consumer devices, and for protecting end user data in an untrusted cloud environment. While SGX assumes a very strong attacker model and indeed even safeguards enclave secrets against a compromised operating system, recent research has demonstrated that considerable private data (e.g., full text and images, complete cryptographic keys) may still be reconstructed by monitoring subtle side-effects of the enclaved execution. We argue that a systematic understanding of such side-channel leakage sources is essential for writing intrinsically secure enclave applications, and will be instrumental to the success of this new trusted execution technology. This tutorial and write-up therefore aims to bring a better understanding of current state-of-the-art side-channel attacks and defenses on Intel SGX platforms. Participants will learn how to extract data from elementary example applications, thereby recognizing how to avoid common pitfalls and information leakage sources in enclave development.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Varys Protecting SGX Enclaves From Practical Side-Channel Attacks
    Oleksenko, Oleksii
    Trach, Bohdan
    Krahn, Robert
    Martin, Andre
    Fetzer, Christof
    Silberstein, Mark
    PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, 2018, : 227 - 239
  • [2] Imitating Functional Operations for Mitigating Side-Channel Leakage
    Dhavlle, Abhijitt
    Rafatirad, Setareh
    Khasawneh, Khaled
    Homayoun, Houman
    Dinakarrao, Sai Manoj Pudukotai
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (04) : 868 - 881
  • [3] TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA
    Oh, Hyunyoung
    Ahmad, Adil
    Park, Seonghyun
    Lee, Byoungyoung
    Paek, Yunheung
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1903 - 1918
  • [4] On the Challenges of Detecting Side-Channel Attacks in SGX
    Jiang, Jianyu
    Soriente, Claudio
    Karame, Ghassan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 86 - 98
  • [5] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [6] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [7] A Survey of Side-Channel Leakage Assessment
    Wang, Yaru
    Tang, Ming
    ELECTRONICS, 2023, 12 (16)
  • [8] Side-Channel Leakage across Borders
    Schmidt, Joern-Marc
    Plos, Thomas
    Kirschbaum, Mario
    Hutter, Michael
    Medwed, Marcel
    Herbst, Christoph
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 36 - 48
  • [9] Side-channel leakage tolerant architectures
    Tiri, Kris
    Schaumont, Patrick
    Verbauwhede, Ingrid
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 204 - +
  • [10] A tutorial on physical security and side-channel attacks
    Koeune, F
    Standaert, FX
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108