Wang Wenhao, Chen Guoxing, Pan Xiaorui, Zhang Yinqian, Wang XiaoFeng, Bindschaedler Vincent, Tang Haixu, Gunter Carl A
Indiana University, Bloomington,
The Ohio State University,
Conf Comput Commun Secur. 2017 Oct-Nov;2017:2421-2434. doi: 10.1145/3133956.3134038.
Side-channel risks of Intel's SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the page-level access patterns of a protected process running in an SGX enclave. With almost all proposed defense focusing on this attack, little is known about whether such efforts indeed raises the bar for the adversary, whether a simple variation of the attack renders all protection ineffective, not to mention an in-depth understanding of other attack surfaces in the SGX system. In the paper, we report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. Our research identifies 8 potential attack vectors, ranging from TLB to DRAM modules. More importantly, we highlight the common misunderstandings about SGX memory side channels, demonstrating that high frequent AEXs can be avoided when recovering EdDSA secret key through a new page channel and fine-grained monitoring of enclave programs (at the level of 64B) can be done through combining both cache and cross-enclave DRAM channels. Our findings reveal the gap between the ongoing security research on SGX and its side-channel weaknesses, redefine the side-channel threat model for secure enclaves, and can provoke a discussion on when to use such a system and how to use it securely.
英特尔软件防护扩展(SGX)的侧信道风险最近备受关注。其中备受瞩目的是新发现的页面错误攻击,在这种攻击中,操作系统级别的对手会引发页面错误,以观察在SGX飞地中运行的受保护进程的页面级访问模式。几乎所有提出的防御措施都聚焦于这种攻击,对于这些努力是否真的提高了对手的攻击门槛、攻击的简单变体是否会使所有保护措施失效,我们知之甚少,更不用说对SGX系统中其他攻击面的深入理解了。在本文中,我们报告了对SGX面临的侧信道威胁进行系统分析的第一步,重点关注与其内存管理相关的风险。我们的研究确定了8个潜在的攻击向量,范围从转换后备缓冲器(TLB)到动态随机存取存储器(DRAM)模块。更重要的是,我们强调了对SGX内存侧信道的常见误解,表明通过一个新的页面信道恢复EdDSA秘密密钥时可以避免高频率的异步外部中断(AEX),并且通过结合缓存和跨飞地DRAM信道,可以对飞地程序进行细粒度监控(在64字节级别)。我们的发现揭示了当前关于SGX的安全研究与其侧信道弱点之间的差距,重新定义了安全飞地的侧信道威胁模型,并可能引发关于何时使用这样的系统以及如何安全使用它的讨论。