Tutorial: Uncovering and Mitigating Side-Channel Leakage in Intel SGX Enclaves

被引:0
作者
Van Bulck, Jo [1 ]
Piessens, Frank [1 ]
机构
[1] Katholieke Univ Leuven, imec DistriNet, Celestijnenlaan 200A, B-3001 Leuven, Belgium
来源
SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018 | 2018年 / 11348卷
基金
比利时弗兰德研究基金会;
关键词
Side-channel; Enclave; SGX; Tutorial;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inclusion of the Software Guard eXtensions (SGX) in recent Intel processors has been broadly acclaimed for bringing strong hardware-enforced trusted computing guarantees to mass consumer devices, and for protecting end user data in an untrusted cloud environment. While SGX assumes a very strong attacker model and indeed even safeguards enclave secrets against a compromised operating system, recent research has demonstrated that considerable private data (e.g., full text and images, complete cryptographic keys) may still be reconstructed by monitoring subtle side-effects of the enclaved execution. We argue that a systematic understanding of such side-channel leakage sources is essential for writing intrinsically secure enclave applications, and will be instrumental to the success of this new trusted execution technology. This tutorial and write-up therefore aims to bring a better understanding of current state-of-the-art side-channel attacks and defenses on Intel SGX platforms. Participants will learn how to extract data from elementary example applications, thereby recognizing how to avoid common pitfalls and information leakage sources in enclave development.
引用
收藏
页数:5
相关论文
empty
未找到相关数据