Papers
Topics
Authors
Recent
Search
2000 character limit reached

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX

Published 20 May 2017 in cs.CR | (1705.07289v2)

Abstract: Side-channel risks of Intel's SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the page-level access patterns of a protected process running in an SGX enclave. With almost all proposed defense focusing on this attack, little is known about whether such efforts indeed raise the bar for the adversary, whether a simple variation of the attack renders all protection ineffective, not to mention an in-depth understanding of other attack surfaces in the SGX system. In the paper, we report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. Our research identifies 8 potential attack vectors, ranging from TLB to DRAM modules. More importantly, we highlight the common misunderstandings about SGX memory side channels, demonstrating that high frequent AEXs can be avoided when recovering EdDSA secret key through a new page channel and fine-grained monitoring of enclave programs (at the level of 64B) can be done through combining both cache and cross-enclave DRAM channels. Our findings reveal the gap between the ongoing security research on SGX and its side-channel weaknesses, redefine the side-channel threat model for secure enclaves, and can provoke a discussion on when to use such a system and how to use it securely.

Citations (358)

Summary

  • The paper systematically identifies eight memory-related side-channel attack vectors in SGX, exposing critical vulnerabilities in current defensive measures.
  • The paper introduces the sneaky page monitoring (SPM) attack, which leverages accessed flags in page table entries to circumvent traditional protections.
  • The paper demonstrates that defenses such as T-SGX are insufficient, urging the need for enhanced hardware and software countermeasures in secure enclaving.

Understanding Memory Side-Channel Hazards in Intel SGX

The paper "Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX" provides a comprehensive analysis of the side-channel threats associated with Intel Software Guard Extensions (SGX), focusing on its memory management systems. Given the substantial interest in SGX due to its promise of secure enclaving for sensitive data, understanding these vulnerabilities is critical for security researchers and practitioners.

The major contribution of the paper is the systematic examination of memory-related side-channel attack vectors in SGX, identifying eight potential attack vectors across CPU caches, translation lookaside buffers (TLBs), paging-structure caches, and DRAM modules. Among these, the paper highlights misunderstandings in current defenses, particularly against page-fault side-channel attacks.

Intel SGX offers a trusted execution environment (TEE) that is designed to be resilient against attacks from a potentially malicious operating system. However, the authors demonstrate that SGX’s memory management systems are exposed to various side-channel attacks. One of the key findings of this paper is that the majority of SGX-related research has disproportionately focused on page-fault attacks, leading to significant security gaps. Despite many assumed protections, simple variations of these attacks can bypass established defenses.

The authors introduce multiple side-channel attack models, with a focus on the sneaky page monitoring (SPM) attack, which exploits the accessed flag in page table entries without inducing high-frequency Asynchronous Enclave eXits (AEXs). Evaluation of these attacks on real-world software, such as the Hunspell spell checker and the FreeType font engine, revealed significant vulnerabilities where sensitive information could be extracted faster than from traditional page-fault attacks.

Another contribution of the paper is the demonstration of a cache-DRAM attack that achieves fine spatial granularity equivalent to the Flush+Reload cache attacks but without the need for shared memory, thus offering a new dimension of threat in SGX scenarios. The effectiveness of these attacks is evaluated against cryptographic operations implemented in real-world libraries, highlighting persistent vulnerabilities that current defenses fail to mitigate.

The paper critically assesses existing defenses including T-SGX, Sanctum, and Deja Vu, showcasing that they protect against some forms of leakage but remain vulnerable to newly introduced attack vectors such as the sneaky page monitoring and cache-DRAM attacks.

The implications of this research point to a broader attack surface on SGX than previously realized. For practitioners, this challenges the perceived security of enclave-based computation and necessitates a reevaluation of defense strategies. Future work is likely to require significant hardware design innovations to address these intricacies, perhaps integrating more robust memory isolation mechanisms to counteract the multi-vector approaches employed by attackers.

In conclusion, this paper not only uncovers new SGX side-channel vulnerabilities but also sets the stage for future research to explore comprehensive defensive architectures that can efficiently respond to the nuanced threats described.

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Collections

Sign up for free to add this paper to one or more collections.