Authors
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A Gunter
Publication date
2017/10/30
Book
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Pages
2421-2434
Description
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is the newly discovered page-fault attack, in which an OS-level adversary induces page faults to observe the page-level access patterns of a protected process running in an SGX enclave. With almost all proposed defense focusing on this attack, little is known about whether such efforts indeed raise the bar for the adversary, whether a simple variation of the attack renders all protection ineffective, not to mention an in-depth understanding of other attack surfaces in the SGX system. In the paper, we report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. Our research identifies 8 potential attack vectors, ranging from TLB to DRAM modules. More importantly, we highlight the common misunderstandings about SGX memory side …
Total citations
20172018201920202021202220232024635689972725723
Scholar articles
W Wang, G Chen, X Pan, Y Zhang, XF Wang… - Proceedings of the 2017 ACM SIGSAC Conference on …, 2017