首页> 外文OA文献 >Malware Guard Extension: Using SGX to Conceal Cache Attacks
【2h】

Malware Guard Extension: Using SGX to Conceal Cache Attacks

机译:恶意软件防护扩展:使用sGX来隐藏缓存攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

In modern computer systems, user processes are isolated from each other bythe operating system and the hardware. Additionally, in a cloud scenario it iscrucial that the hypervisor isolates tenants from other tenants that areco-located on the same physical machine. However, the hypervisor does notprotect tenants against the cloud provider and thus the supplied operatingsystem and hardware. Intel SGX provides a mechanism that addresses thisscenario. It aims at protecting user-level software from attacks from otherprocesses, the operating system, and even physical attackers. In this paper, we demonstrate fine-grained software-based side-channelattacks from a malicious SGX enclave targeting co-located enclaves. Our attackis the first malware running on real SGX hardware, abusing SGX protectionfeatures to conceal itself. Furthermore, we demonstrate our attack both in anative environment and across multiple Docker containers. We perform aPrime+Probe cache side-channel attack on a co-located SGX enclave running anup-to-date RSA implementation that uses a constant-time multiplicationprimitive. The attack works although in SGX enclaves there are no timers, nolarge pages, no physical addresses, and no shared memory. In a semi-synchronousattack, we extract 96% of an RSA private key from a single trace. We extractthe full RSA private key in an automated attack from 11 traces within 5minutes.
机译:在现代计算机系统中,用户进程通过操作系统和硬件相互隔离。此外,在云方案中,系统管理程序必须将租户与位于同一物理计算机上的其他租户隔离开来。但是,系统管理程序不会针对云提供商以及租户提供的操作系统和硬件来保护租户。英特尔SGX提供了一种解决这种情况的机制。它旨在保护用户级软件免受来自其他进程,操作系统甚至物理攻击者的攻击。在本文中,我们演示了针对以同位飞地为目标的恶意SGX飞地中基于软件的细粒度侧信道攻击。我们的攻击是在真正的SGX硬件上运行的第一个恶意软件,滥用SGX保护功能来掩盖自身。此外,我们展示了在静态环境和多个Docker容器中的攻击。我们在运行最新RSA实施并使用恒定时间乘法基元的SGX飞地上对Prime + Probe缓存侧通道进行攻击。尽管在SGX飞地中没有计时器,没有大页面,没有物理地址和没有共享内存,但该攻击仍然有效。在半同步攻击中,我们从单个跟踪中提取了96%的RSA私钥。我们在5分钟内从11条跟踪中自动提取了完整的RSA私钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号