首页> 外文OA文献 >SGX-Step: A practical attack framework for precise enclave execution control
【2h】

SGX-Step: A practical attack framework for precise enclave execution control

机译:SGX-Step:用于精确的飞地执行控制的实用攻击框架

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Protected module architectures such as Intel SGX hold the promise of protecting sensitive computations from a potentially compromised operating system. Recent research convincingly demonstrated, however, that SGX's strengthened adversary model also gives rise to to a new class of powerful, low-noise side-channel attacks leveraging first-rate control over hardware. These attacks commonly rely on frequent enclave preemptions to obtain fine-grained side-channel observations. A maximal temporal resolution is achieved when the victim state is measured after every instruction. Current state-of-the-art enclave execution control schemes, however, do not generally achieve such instruction-level granularity.This paper presents SGX-Step, an open-source Linux kernel framework that allows an untrusted host process to configure APIC timer interrupts and track page table entries directly from user space. We contribute and evaluate an improved approach to single-step enclaved execution at instruction-level granularity, and we show how SGX-Step enables several new or improved attacks. Finally, we discuss its implications for the design of effective defense mechanisms.
机译:受保护的模块架构(例如Intel SGX)有望保护敏感的计算不受潜在的操作系统侵害。然而,最近的研究令人信服地表明,SGX增强的对手模型还引发了利用硬件的一流控制的新型强大,低噪声的旁通道攻击。这些攻击通常依靠频繁的飞地抢占来获得细粒度的边道观测。在每条指令之后测量受害人状态时,可获得最大的时间分辨率。但是,当前最先进的飞地执行控制方案通常无法实现这样的指令级粒度。本文介绍了SGX-Step,这是一种开放源代码Linux内核框架,它允许不受信任的主机进程配置APIC计时器中断并直接从用户空间跟踪页表条目。我们以指令级粒度为单步安全区执行提供了改进的评估方法,并展示了SGX-Step如何启用多种新的或改进的攻击。最后,我们讨论了其对有效防御机制设计的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号