首页> 外文会议>IEEE European Symposium on Security and Privacy >SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution
【24h】

SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution

机译:SgxPectre:通过推测性执行来窃取SGX Enclaves中的Intel秘密

获取原文

摘要

Speculative execution side-channel vulnerabilities in micro-architecture processors have raised concerns about the security of Intel SGX. To understand clearly the security impact of this vulnerability against SGX, this paper makes the following studies: First, to demonstrate the feasibility of the attacks, we present SgxPectre Attacks (the SGX-variants of Spectre attacks) that exploit speculative execution side-channel vulnerabilities to subvert the confidentiality of SGX enclaves. We show that when the branch prediction of the enclave code can be influenced by programs outside the enclave, the control flow of the enclave program can be temporarily altered to execute instructions that lead to observable cache-state changes. An adversary observing such changes can learn secrets inside the enclave memory or its internal registers, thus completely defeating the confidentiality guarantee offered by SGX. Second, to determine whether real-world enclave programs are impacted by the attacks, we develop techniques to automate the search of vulnerable code patterns in enclave binaries using symbolic execution. Our study suggests that nearly any enclave program could be vulnerable to SgxPectre Attacks since vulnerable code patterns are available in most SGX runtimes (e.g., Intel SGX SDK, Rust-SGX, and Graphene-SGX). Third, we apply SgxPectre Attacks to steal seal keys and attestation keys from Intel signed quoting enclaves. The seal key can be used to decrypt sealed storage outside the enclaves and forge valid sealed data; the attestation key can be used to forge attestation signatures. For these reasons, SgxPectre Attacks practically defeat SGX's security protection. Finally, we evaluate Intel's existing countermeasures against SgxPectre Attacks and discusses the security implications.
机译:微体系结构处理器中的推测性执行边通道漏洞引起了人们对英特尔SGX安全性的担忧。为了清楚地了解此漏洞对SGX的安全性影响,本文进行了以下研究:首先,为了演示攻击的可行性,我们介绍利用推测性执行侧通道漏洞的SgxPectre攻击(Spectre攻击的SGX变体)。颠覆新交所飞地的机密性。我们显示,当安全区代码的分支预测会受到安全区外部程序的影响时,安全区程序的控制流可以暂时更改以执行导致可观察到的高速缓存状态更改的指令。观察到这种变化的对手可以了解安全区域存储器或其内部寄存器中的秘密,从而完全破坏了新交所提供的机密性保证。其次,为了确定现实世界中的飞地程序是否受到攻击的影响,我们开发了使用符号执行来自动在飞地二进制文件中搜索易受攻击的代码模式的技术。我们的研究表明,由于大多数SGX运行时(例如,英特尔SGX SDK,Rust-SGX和Graphene-SGX)都提供了易受攻击的代码模式,因此几乎任何飞地程序都可能易受SgxPectre攻击。第三,我们应用SgxPectre Attacks来从Intel签名的报价飞地中窃取密封密钥和证明密钥。密封密钥可用于解密飞地外部的密封存储,并伪造有效的密封数据。证明密钥可用于伪造证明签名。由于这些原因,SgxPectre Attacks几乎破坏了SGX的安全保护。最后,我们评估了英特尔针对SgxPectre攻击的现有对策,并讨论了其安全隐患。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号