On the Challenges of Detecting Side-Channel Attacks in SGX

被引:4
|
作者
Jiang, Jianyu [1 ]
Soriente, Claudio [2 ]
Karame, Ghassan [3 ]
机构
[1] Univ Hong Kong, Hong Kong, Peoples R China
[2] NEC Labs Europe, Madrid, Spain
[3] Ruhr Univ Bochum, Bochum, Germany
关键词
Side-channel Attacks; Intel Software Guard eXtensions (SGX);
D O I
10.1145/3545948.3545972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing tools to detect side-channel attacks on Intel SGX are grounded on the observation that attacks affect the performance of the victim application. As such, all detection tools monitor the potential victim and raise an alarm if the witnessed performance (in terms of runtime, enclave interruptions, cache misses, etc.) is out of the ordinary. In this paper, we show that monitoring the performance of enclaves to detect side-channel attacks may not be effective. Our core intuition is that all monitoring tools are geared towards an adversary that interferes with the victim's execution in order to extract the most number of secret bits (e.g., the entire secret) in one or few runs. They cannot, however, detect an adversary that leaks smaller portions of the secret-as small as a single bit-at each execution of the victim. In particular, by minimizing the information leaked at each run, the impact of any side-channel attack on the application's performance is significantly lowered-ensuring that the detection tool does not detect an attack. By repeating the attack multiple times, each time on a different part of the secret, the adversary can recover the whole secret and remain undetected. Based on this intuition, we adapt known attacks leveraging page-tables and L3 cache to bypass existing detection mechanisms. We show experimentally how an attacker can successfully exfiltrate the secret key used in an enclave running various cryptographic routines of libgcrypt. Beyond cryptographic libraries, we also show how to compromise the predictions of enclaves running decision-tree routines of OpenCV. Our evaluation results suggest that performance-based detection tools do not deter side-channel attacks on SGX enclaves and that effective detection mechanisms are yet to be designed.
引用
收藏
页码:86 / 98
页数:13
相关论文
共 50 条
  • [1] Varys Protecting SGX Enclaves From Practical Side-Channel Attacks
    Oleksenko, Oleksii
    Trach, Bohdan
    Krahn, Robert
    Martin, Andre
    Fetzer, Christof
    Silberstein, Mark
    PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, 2018, : 227 - 239
  • [2] SpyDetector: An approach for detecting side-channel attacks at runtime
    Yusuf Kulah
    Berkay Dincer
    Cemal Yilmaz
    Erkay Savas
    International Journal of Information Security, 2019, 18 : 393 - 422
  • [3] SpyDetector: An approach for detecting side-channel attacks at runtime
    Kulah, Yusuf
    Dincer, Berkay
    Yilmaz, Cemal
    Savas, Erkay
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (04) : 393 - 422
  • [4] Preventing and Detecting Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis A.
    Kifayat, Kashif
    Hussain, Abir
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [5] MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape
    Lang, Fan
    Wang, Wei
    Meng, Lingjia
    Lin, Jingqiang
    Wang, Qiongxiao
    Lu, Linli
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 978 - 988
  • [6] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [7] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [8] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [9] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [10] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410