Malware Guard Extension: abusing Intel SGX to conceal cache attacks

Michael Schwarz*, Samuel Weiser, Daniel Gruß, Clementine Lucie Noemie Maurice, Stefan Mangard

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in einer FachzeitschriftArtikelBegutachtung

Abstract

In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine. However, the hypervisor does not protect tenants against the cloud provider and thus, the supplied operating system and hardware. Intel SGX provides a mechanism that addresses this scenario. It aims at protecting user-level software from attacks from other processes, the operating system, and even physical attackers. In this paper, we demonstrate fine-grained software-based side-channel attacks from a malicious SGX enclave targeting co-located enclaves. Our attack is the first malware running on real SGX hardware, abusing SGX protection features to conceal itself. Furthermore, we demonstrate our attack both in a native environment and across multiple Docker containers. We perform a Prime+Probe cache side-channel attack on a co-located SGX enclave running an up-to-date RSA implementation that uses a constant-time multiplication primitive. The attack works, although in SGX enclaves, there are no timers, no large pages, no physical addresses, and no shared memory. In a semi-synchronous attack, we extract 96 % of an RSA private key from a single trace. We extract the full RSA private key in an automated attack from 11 traces within 5 min.
Originalspracheenglisch
Aufsatznummer2
Seitenumfang20
FachzeitschriftCybersecurity
Jahrgang3
Ausgabenummer1
DOIs
PublikationsstatusVeröffentlicht - 1 Dez. 2020

ASJC Scopus subject areas

  • Software
  • Artificial intelligence
  • Information systems
  • Computernetzwerke und -kommunikation

Fingerprint

Untersuchen Sie die Forschungsthemen von „Malware Guard Extension: abusing Intel SGX to conceal cache attacks“. Zusammen bilden sie einen einzigartigen Fingerprint.
  • EU - SOPHIA - Absicherung von Software gegen Physische Angriffe

    Mangard, S. (Teilnehmer (Co-Investigator))

    1/09/1631/12/21

    Projekt: Forschungsprojekt

  • Verlaesslichkeit im Internet der Dinge

    Boano, C. A. (Teilnehmer (Co-Investigator)), Kubin, G. (Teilnehmer (Co-Investigator)), Bloem, R. (Teilnehmer (Co-Investigator)), Horn, M. (Teilnehmer (Co-Investigator)), Pernkopf, F. (Teilnehmer (Co-Investigator)), Zakany, N. (Teilnehmer (Co-Investigator)), Mangard, S. (Teilnehmer (Co-Investigator)), Witrisal, K. (Teilnehmer (Co-Investigator)), Römer, K. U. (Teilnehmer (Co-Investigator)), Aichernig, B. (Teilnehmer (Co-Investigator)), Bösch, W. (Teilnehmer (Co-Investigator)), Baunach, M. C. (Teilnehmer (Co-Investigator)), Tappler, M. (Teilnehmer (Co-Investigator)), Malenko, M. (Teilnehmer (Co-Investigator)), Weiser, S. (Teilnehmer (Co-Investigator)), Eichlseder, M. (Teilnehmer (Co-Investigator)), Leitinger, E. (Teilnehmer (Co-Investigator)), Grosinger, J. (Teilnehmer (Co-Investigator)), Großwindhager, B. (Teilnehmer (Co-Investigator)), Ebrahimi, M. (Teilnehmer (Co-Investigator)), Alothman Alterkawi, A. B. (Teilnehmer (Co-Investigator)), Knoll, C. (Teilnehmer (Co-Investigator)), Teschl, R. (Teilnehmer (Co-Investigator)), Saukh, O. (Teilnehmer (Co-Investigator)), Rath, M. (Teilnehmer (Co-Investigator)), Steinberger, M. (Teilnehmer (Co-Investigator)), Steinbauer-Wagner, G. (Teilnehmer (Co-Investigator)) & Tranninger, M. (Teilnehmer (Co-Investigator))

    1/01/1631/03/22

    Projekt: Forschungsprojekt

  • Malware guard extension: Using SGX to conceal cache attacks

    Schwarz, M., Weiser, S., Gruss, D., Maurice, C. & Mangard, S., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Springer-Verlag Italia, Band 10327 LNCS. S. 3-24 22 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 10327 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

    Open Access
    Datei

Dieses zitieren