On the Challenges of Detecting Side-Channel Attacks in SGX

被引:4
|
作者
Jiang, Jianyu [1 ]
Soriente, Claudio [2 ]
Karame, Ghassan [3 ]
机构
[1] Univ Hong Kong, Hong Kong, Peoples R China
[2] NEC Labs Europe, Madrid, Spain
[3] Ruhr Univ Bochum, Bochum, Germany
来源
PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022 | 2022年
关键词
Side-channel Attacks; Intel Software Guard eXtensions (SGX);
D O I
10.1145/3545948.3545972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing tools to detect side-channel attacks on Intel SGX are grounded on the observation that attacks affect the performance of the victim application. As such, all detection tools monitor the potential victim and raise an alarm if the witnessed performance (in terms of runtime, enclave interruptions, cache misses, etc.) is out of the ordinary. In this paper, we show that monitoring the performance of enclaves to detect side-channel attacks may not be effective. Our core intuition is that all monitoring tools are geared towards an adversary that interferes with the victim's execution in order to extract the most number of secret bits (e.g., the entire secret) in one or few runs. They cannot, however, detect an adversary that leaks smaller portions of the secret-as small as a single bit-at each execution of the victim. In particular, by minimizing the information leaked at each run, the impact of any side-channel attack on the application's performance is significantly lowered-ensuring that the detection tool does not detect an attack. By repeating the attack multiple times, each time on a different part of the secret, the adversary can recover the whole secret and remain undetected. Based on this intuition, we adapt known attacks leveraging page-tables and L3 cache to bypass existing detection mechanisms. We show experimentally how an attacker can successfully exfiltrate the secret key used in an enclave running various cryptographic routines of libgcrypt. Beyond cryptographic libraries, we also show how to compromise the predictions of enclaves running decision-tree routines of OpenCV. Our evaluation results suggest that performance-based detection tools do not deter side-channel attacks on SGX enclaves and that effective detection mechanisms are yet to be designed.
引用
收藏
页码:86 / 98
页数:13
相关论文
共 50 条
  • [31] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1573 - 1576
  • [32] Leaking secrets in homomorphic encryption with side-channel attacks
    Aydin, Furkan
    Aysu, Aydin
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (02) : 241 - 251
  • [33] Combined side-channel attacks on COMP128
    Levina, Alla
    Korovkin, Mikhail
    Sleptsova, Dania
    2014 IEEE 8TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2014, : 2 - 4
  • [34] The investigation of neural networks performance in side-channel attacks
    Yinan Kong
    Ehsan Saeedi
    Artificial Intelligence Review, 2019, 52 : 607 - 623
  • [35] Profiling side-channel attacks based on CNN model fusion
    Ni, Lei
    Wang, Pengjun
    Zhang, Yuejun
    Zhang, Huihong
    Li, Xiangyu
    Ni, Li
    Lv, Jie
    Zheng, Weifang
    MICROELECTRONICS JOURNAL, 2023, 139
  • [36] Applications of machine learning techniques in side-channel attacks: a survey
    Hettwer, Benjamin
    Gehrer, Stefan
    Gueneysu, Tim
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 135 - 162
  • [37] Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs
    Moini, Shayan
    Tian, Shanquan
    Holcomb, Daniel
    Szefer, Jakub
    Tessier, Russell
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 357 - 370
  • [38] Multiple-differential side-channel collision attacks on AES
    Bogdanov, Andrey
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 30 - 44
  • [39] Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction
    Alqurashi, Fahad
    AL-Hashimi, Mohammed
    Saleh, Mostafa
    Abulnaja, Osama
    COMPUTERS, 2025, 14 (02)
  • [40] SecDir: A Secure Directory to Defeat Directory Side-Channel Attacks
    Yan, Mengjia
    Wen, Jen-Yang
    Fletcher, Christopher W.
    Torrellas, Josep
    PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 332 - 345