On the Challenges of Detecting Side-Channel Attacks in SGX

被引:4
|
作者
Jiang, Jianyu [1 ]
Soriente, Claudio [2 ]
Karame, Ghassan [3 ]
机构
[1] Univ Hong Kong, Hong Kong, Peoples R China
[2] NEC Labs Europe, Madrid, Spain
[3] Ruhr Univ Bochum, Bochum, Germany
关键词
Side-channel Attacks; Intel Software Guard eXtensions (SGX);
D O I
10.1145/3545948.3545972
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing tools to detect side-channel attacks on Intel SGX are grounded on the observation that attacks affect the performance of the victim application. As such, all detection tools monitor the potential victim and raise an alarm if the witnessed performance (in terms of runtime, enclave interruptions, cache misses, etc.) is out of the ordinary. In this paper, we show that monitoring the performance of enclaves to detect side-channel attacks may not be effective. Our core intuition is that all monitoring tools are geared towards an adversary that interferes with the victim's execution in order to extract the most number of secret bits (e.g., the entire secret) in one or few runs. They cannot, however, detect an adversary that leaks smaller portions of the secret-as small as a single bit-at each execution of the victim. In particular, by minimizing the information leaked at each run, the impact of any side-channel attack on the application's performance is significantly lowered-ensuring that the detection tool does not detect an attack. By repeating the attack multiple times, each time on a different part of the secret, the adversary can recover the whole secret and remain undetected. Based on this intuition, we adapt known attacks leveraging page-tables and L3 cache to bypass existing detection mechanisms. We show experimentally how an attacker can successfully exfiltrate the secret key used in an enclave running various cryptographic routines of libgcrypt. Beyond cryptographic libraries, we also show how to compromise the predictions of enclaves running decision-tree routines of OpenCV. Our evaluation results suggest that performance-based detection tools do not deter side-channel attacks on SGX enclaves and that effective detection mechanisms are yet to be designed.
引用
收藏
页码:86 / 98
页数:13
相关论文
共 50 条
  • [41] Tutorial: Uncovering and Mitigating Side-Channel Leakage in Intel SGX Enclaves
    Van Bulck, Jo
    Piessens, Frank
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348
  • [42] Better Side-Channel Attacks Through Measurements
    Singh, Alok K.
    Gerdes, Ryan M.
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 15 - 26
  • [43] Enhanced Side-Channel Cube Attacks on PRESENT
    Zhao, Xinjie
    Guo, Shize
    Zhang, Fan
    Wang, Tao
    Shi, Zhijie
    Luo, Hao
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 332 - 339
  • [44] Side-Channel Attacks on Fingerprint Matching Algorithms
    Duermuth, Markus
    Oswald, David
    Pastewka, Niklas
    TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 3 - 13
  • [45] Beyond the CPU: Side-Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE DESIGN & TEST, 2021, 38 (03) : 15 - 21
  • [46] SonarSnoop: active acoustic side-channel attacks
    Peng Cheng
    Ibrahim Ethem Bagci
    Utz Roedig
    Jeff Yan
    International Journal of Information Security, 2020, 19 : 213 - 228
  • [47] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [48] Acoustic Side-Channel Attacks on a Computer Mouse
    Conti, Mauro
    Duroyon, Marin
    Orazi, Gabriele
    Tsudik, Gene
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2024, 2024, 14828 : 44 - 63
  • [49] Remote Side-Channel Attacks on Heterogeneous SoC
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    Olivier, Francis
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 109 - 125
  • [50] Side-Channel Attacks on Optane Persistent Memory
    Liu, Sihang
    Kanniwadi, Suraaj
    Schwarzl, Martin
    Kogler, Andreas
    Gruss, Daniel
    Khan, Samira
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6807 - 6824