On the Challenges of Detecting Side-Channel Attacks in SGX

被引:4
|
作者
Jiang, Jianyu [1 ]
Soriente, Claudio [2 ]
Karame, Ghassan [3 ]
机构
[1] Univ Hong Kong, Hong Kong, Peoples R China
[2] NEC Labs Europe, Madrid, Spain
[3] Ruhr Univ Bochum, Bochum, Germany
来源
PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022 | 2022年
关键词
Side-channel Attacks; Intel Software Guard eXtensions (SGX);
D O I
10.1145/3545948.3545972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing tools to detect side-channel attacks on Intel SGX are grounded on the observation that attacks affect the performance of the victim application. As such, all detection tools monitor the potential victim and raise an alarm if the witnessed performance (in terms of runtime, enclave interruptions, cache misses, etc.) is out of the ordinary. In this paper, we show that monitoring the performance of enclaves to detect side-channel attacks may not be effective. Our core intuition is that all monitoring tools are geared towards an adversary that interferes with the victim's execution in order to extract the most number of secret bits (e.g., the entire secret) in one or few runs. They cannot, however, detect an adversary that leaks smaller portions of the secret-as small as a single bit-at each execution of the victim. In particular, by minimizing the information leaked at each run, the impact of any side-channel attack on the application's performance is significantly lowered-ensuring that the detection tool does not detect an attack. By repeating the attack multiple times, each time on a different part of the secret, the adversary can recover the whole secret and remain undetected. Based on this intuition, we adapt known attacks leveraging page-tables and L3 cache to bypass existing detection mechanisms. We show experimentally how an attacker can successfully exfiltrate the secret key used in an enclave running various cryptographic routines of libgcrypt. Beyond cryptographic libraries, we also show how to compromise the predictions of enclaves running decision-tree routines of OpenCV. Our evaluation results suggest that performance-based detection tools do not deter side-channel attacks on SGX enclaves and that effective detection mechanisms are yet to be designed.
引用
收藏
页码:86 / 98
页数:13
相关论文
共 50 条
  • [21] Side-Channel Attacks on Triple Modular Redundancy Schemes
    Almeida, Felipe
    Aksoy, Levent
    Raik, Jaan
    Pagliarini, Samuel
    2021 IEEE 30TH ASIAN TEST SYMPOSIUM (ATS 2021), 2021, : 79 - 84
  • [22] Applying Thermal Side-Channel Attacks on Asymmetric Cryptography
    Aljuffri, Abdullah
    Zwalua, Marc
    Reinbrecht, Cezar Rodolfo Wedig
    Hamdioui, Said
    Taouil, Mottaqiallah
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (11) : 1930 - 1942
  • [23] Side-channel attacks and learning-vector quantization
    Saeedi, Ehsan
    Kong, Yinan
    Hossain, Md. Selim
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (04) : 511 - 518
  • [24] A Memory Hierarchy Protected against Side-Channel Attacks
    Talaki, Ezinam Bertrand
    Savry, Olivier
    Bouvier Des Noes, Mathieu
    Hely, David
    CRYPTOGRAPHY, 2022, 6 (02)
  • [25] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [26] Moving Target Defense Mechanism for Side-Channel Attacks
    Vuppala, Satyanarayana
    Mady, Alie El-Din
    Kuenzi, Adam
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1810 - 1819
  • [27] The investigation of neural networks performance in side-channel attacks
    Kong, Yinan
    Saeedi, Ehsan
    ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (01) : 607 - 623
  • [28] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [29] Side-channel attacks and learning-vector quantization
    Ehsan Saeedi
    Yinan Kong
    Md. Selim Hossain
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 511 - 518
  • [30] Unified point addition formulae and side-channel attacks
    Stebila, Douglas
    Theriault, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 354 - 368