首页> 外文会议>IEEE European Symposium on Security and Privacy >SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution
【24h】

SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution

机译:SGXPectre:通过推测执行窃取SGX的英特尔秘密

获取原文

摘要

Speculative execution side-channel vulnerabilities in micro-architecture processors have raised concerns about the security of Intel SGX. To understand clearly the security impact of this vulnerability against SGX, this paper makes the following studies: First, to demonstrate the feasibility of the attacks, we present SgxPectre Attacks (the SGX-variants of Spectre attacks) that exploit speculative execution side-channel vulnerabilities to subvert the confidentiality of SGX enclaves. We show that when the branch prediction of the enclave code can be influenced by programs outside the enclave, the control flow of the enclave program can be temporarily altered to execute instructions that lead to observable cache-state changes. An adversary observing such changes can learn secrets inside the enclave memory or its internal registers, thus completely defeating the confidentiality guarantee offered by SGX. Second, to determine whether real-world enclave programs are impacted by the attacks, we develop techniques to automate the search of vulnerable code patterns in enclave binaries using symbolic execution. Our study suggests that nearly any enclave program could be vulnerable to SgxPectre Attacks since vulnerable code patterns are available in most SGX runtimes (e.g., Intel SGX SDK, Rust-SGX, and Graphene-SGX). Third, we apply SgxPectre Attacks to steal seal keys and attestation keys from Intel signed quoting enclaves. The seal key can be used to decrypt sealed storage outside the enclaves and forge valid sealed data; the attestation key can be used to forge attestation signatures. For these reasons, SgxPectre Attacks practically defeat SGX's security protection. Finally, we evaluate Intel's existing countermeasures against SgxPectre Attacks and discusses the security implications.
机译:在微架构的处理器投机执行侧信道安全漏洞已经提出了关于英特尔SGX的安全顾虑。为了清楚地了解对SGX此漏洞的安全影响,本文提出了以下研究:首先,证明攻击的可行性,我们目前SgxPectre攻击(幽灵攻击SGX变体),其利用推测执行侧信道安全漏洞颠覆SGX飞地的保密性。我们表明,在飞地代码的分支预测可以通过隔离区外计划的影响,飞地程序的控制流可以暂时改变来执行,导致观察到的高速缓存的状态变化的说明。对手观察这种变化可以知道的秘密飞地存储器或内部寄存器内,从而彻底击败新交所提供的机密性保证。其次,以确定是否真实世界飞地程序由攻击的影响,我们开发的技术来自动使用符号执行飞地二进制文件的搜索有漏洞的代码模式。我们的研究表明,由于漏洞的代码模式是最SGX运行时提供几乎任何飞地计划可能会受到攻击SgxPectre(例如,英特尔SGX SDK,防锈SGX和石墨烯-SGX)。第三,我们应用SgxPectre攻击从英特尔偷密封密钥和认证密钥签名的报价飞地。该密封件密钥可以用来解密密封的储存飞地外面和伪造有效密封的数据;认证密钥可以用来伪造认证签名。由于这些原因,SgxPectre攻击几乎击败新交所的安全保护。最后,我们评估了英特尔现有的对SgxPectre攻击和讨论的安全问题的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号