On the Challenges of Detecting Side-Channel Attacks in SGX

被引:4
|
作者
Jiang, Jianyu [1 ]
Soriente, Claudio [2 ]
Karame, Ghassan [3 ]
机构
[1] Univ Hong Kong, Hong Kong, Peoples R China
[2] NEC Labs Europe, Madrid, Spain
[3] Ruhr Univ Bochum, Bochum, Germany
来源
PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022 | 2022年
关键词
Side-channel Attacks; Intel Software Guard eXtensions (SGX);
D O I
10.1145/3545948.3545972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing tools to detect side-channel attacks on Intel SGX are grounded on the observation that attacks affect the performance of the victim application. As such, all detection tools monitor the potential victim and raise an alarm if the witnessed performance (in terms of runtime, enclave interruptions, cache misses, etc.) is out of the ordinary. In this paper, we show that monitoring the performance of enclaves to detect side-channel attacks may not be effective. Our core intuition is that all monitoring tools are geared towards an adversary that interferes with the victim's execution in order to extract the most number of secret bits (e.g., the entire secret) in one or few runs. They cannot, however, detect an adversary that leaks smaller portions of the secret-as small as a single bit-at each execution of the victim. In particular, by minimizing the information leaked at each run, the impact of any side-channel attack on the application's performance is significantly lowered-ensuring that the detection tool does not detect an attack. By repeating the attack multiple times, each time on a different part of the secret, the adversary can recover the whole secret and remain undetected. Based on this intuition, we adapt known attacks leveraging page-tables and L3 cache to bypass existing detection mechanisms. We show experimentally how an attacker can successfully exfiltrate the secret key used in an enclave running various cryptographic routines of libgcrypt. Beyond cryptographic libraries, we also show how to compromise the predictions of enclaves running decision-tree routines of OpenCV. Our evaluation results suggest that performance-based detection tools do not deter side-channel attacks on SGX enclaves and that effective detection mechanisms are yet to be designed.
引用
收藏
页码:86 / 98
页数:13
相关论文
共 50 条
  • [41] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [42] TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
    Li, Mengming
    Bu, Kai
    Miao, Chenlu
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4574 - 4588
  • [43] Analysis and countermeasures to side-channel attacks: a hardware design perspective
    Zoni, Davide
    2019 14TH INTERNATIONAL SYMPOSIUM ON RECONFIGURABLE COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC 2019), 2019, : 1 - 4
  • [44] Tamper Resistance of Contactless IC Card to Side-Channel Attacks
    Kanno, Tetsutarou
    Iwai, Keisuke
    Kurokawa, Takakazu
    PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 126 - 133
  • [45] A new Foe in biometrics: A narrative review of side-channel attacks
    Galbally, Javier
    COMPUTERS & SECURITY, 2020, 96
  • [46] Cross-Tenant Side-Channel Attacks in PaaS Clouds
    Zhang, Yinqian
    Juels, Ari
    Reiter, Michael K.
    Ristenpart, Thomas
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 990 - 1003
  • [47] Applications of machine learning techniques in side-channel attacks: a survey
    Benjamin Hettwer
    Stefan Gehrer
    Tim Güneysu
    Journal of Cryptographic Engineering, 2020, 10 : 135 - 162
  • [48] Micro-architectural Cache Side-Channel Attacks and Countermeasures
    Shen, Chaoqun
    Chen, Congcong
    Zhang, Jiliang
    2021 26TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2021, : 441 - 448
  • [49] Side-Channel Attacks With Multi-Thread Mixed Leakage
    Gao, Yiwen
    Zhou, Yongbin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 770 - 785
  • [50] Physical Side-Channel Attacks and Covert Communication on FPGAs: A Survey
    Mirzargar, Seyedeh Sharareh
    Stojilovic, Mirjana
    2019 29TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2019, : 202 - 210