Recent research has demonstrated that Intel’s SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they require either error-prone developer assistance, incur extremely high runtime overhead, or prevent only specific attacks.In this paper, we propose data location randomization as a novel defense against side-channel attacks that target data access patterns.Our goal is to break the link between the memory observations by the adversary and the actual data accesses by the victim. We design and implement a compiler-based tool called DR.SGX that instruments the enclave code, permuting data locations at fine granularity.To prevent correlation of repeated memory accesses we periodically re-randomize all enclave data. Our solution requires no developer assistance and strikes the balance between side-channel protection and performance based on an adjustable security parameter.
%0 Conference Paper
%1 brasser2019drsgx
%A Brasser, Ferdinand
%A Capkun, Srdjan
%A Dmitrienko, Alexandra
%A Frassetto, Tommaso
%A Kostiainen, Kari
%A Sadeghi, Ahmad-Reza
%B Annual Computer Security Applications Conference (ACSAC)
%D 2019
%I ACM
%K international-conference-workshop-papers-book-chapters myown sss-group technical-reports
%T DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
%U https://arxiv.org/abs/1709.09917
%X Recent research has demonstrated that Intel’s SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they require either error-prone developer assistance, incur extremely high runtime overhead, or prevent only specific attacks.In this paper, we propose data location randomization as a novel defense against side-channel attacks that target data access patterns.Our goal is to break the link between the memory observations by the adversary and the actual data accesses by the victim. We design and implement a compiler-based tool called DR.SGX that instruments the enclave code, permuting data locations at fine granularity.To prevent correlation of repeated memory accesses we periodically re-randomize all enclave data. Our solution requires no developer assistance and strikes the balance between side-channel protection and performance based on an adjustable security parameter.
@inproceedings{brasser2019drsgx,
abstract = {Recent research has demonstrated that Intel’s SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they require either error-prone developer assistance, incur extremely high runtime overhead, or prevent only specific attacks.In this paper, we propose data location randomization as a novel defense against side-channel attacks that target data access patterns.Our goal is to break the link between the memory observations by the adversary and the actual data accesses by the victim. We design and implement a compiler-based tool called DR.SGX that instruments the enclave code, permuting data locations at fine granularity.To prevent correlation of repeated memory accesses we periodically re-randomize all enclave data. Our solution requires no developer assistance and strikes the balance between side-channel protection and performance based on an adjustable security parameter.},
added-at = {2021-03-17T12:33:40.000+0100},
author = {Brasser, Ferdinand and Capkun, Srdjan and Dmitrienko, Alexandra and Frassetto, Tommaso and Kostiainen, Kari and Sadeghi, Ahmad-Reza},
biburl = {https://www.bibsonomy.org/bibtex/2ce732320874276ac23544a114ed48779/sssgroup},
booktitle = {Annual Computer Security Applications Conference (ACSAC)},
interhash = {22d1641bf49a2acc601339639862cc50},
intrahash = {ce732320874276ac23544a114ed48779},
keywords = {international-conference-workshop-papers-book-chapters myown sss-group technical-reports},
month = {December},
publisher = {ACM},
timestamp = {2022-09-21T10:40:46.000+0200},
title = {DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization},
url = {https://arxiv.org/abs/1709.09917},
venue = {ACSAC},
year = 2019
}