首页> 外文期刊>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems >VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX
【24h】

VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX

机译:电压:Intel SGX上的一种新型动态电压缩放的故障注射攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Intel software guard extensions (SGX) increase the security of applications by enabling them to be performed in a highly trusted space (called enclave). Most state-of-the-art attacks on SGX focus on either mining the software vulnerabilities in the enclave or speculating the secret data with side channels. In this study, we report our recent work on breaking SGX by inducing voltage-oriented hardware faults. The novelty and importance of this attack are that it is completely controlled by software and does not require any security vulnerability in the software. Our proposed attack, called VoltJockey, exploits a vulnerability in the implementation of dynamic voltage and frequency scaling (DVFS) that achieves energy saving by dynamically adjusting the processor's operating voltage and thus clock frequency. However, if the operating voltage is lower than a certain critical level, the circuit's timing constraint will fail and hardware fault would be created. We propose to deliberately trigger such voltage-oriented hardware faults by a loadable kernel module that can set the processor's voltage through Intel's undocumented model-specific register (MSR). We first utilize the module to furnish the processor with a transient low voltage with controlled timing to inject a temporal fault into the target location of the program running in the enclave. Then, we perform a differential fault attack on the outputs before and after the injection of faults. For demonstration, we successfully deploy the proposed attack to extract the key of an AES executed in the enclave and lead an SGX-protected RSA to output our specified result.
机译:英特尔软件保护扩展(SGX)通过使它们能够在高度可信的空间(称为Cancave)中来提高应用程序的安全性。对SGX的大多数最先进的攻击侧重于挖掘飞机中的软件漏洞或使用侧视通道拨出秘密数据。在这项研究中,我们通过诱导导向电压的硬件故障来报告我们最近的工作打破SGX。这种攻击的新颖性和重要性是它完全由软件控制,并且不需要软件中的任何安全漏洞。我们所提出的攻击,称为电压会,利用动态电压和频率缩放(DVF)实现的脆弱性,通过动态调整处理器的工作电压并因此进行时钟频率来实现节能。但是,如果工作电压低于某个临界水平,则电路的定时约束将失败,并且将创建硬件故障。我们建议通过可加载的内核模块进行故意触发这种导向的硬件故障,该模块可以通过英特尔未记录的模型特定寄存器(MSR)将处理器的电压设置为。我们首先利用模块来提供具有瞬态低电压的处理器,具有受控定时,以将时间错误注入到在飞地上运行的程序的目标位置。然后,我们在注入故障之前和之后对输出执行差异故障攻击。为了演示,我们成功部署了所提出的攻击,以提取在“分区”中执行的AES的键,并引导SGX受保护的RSA来输出我们的指定结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号