Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns. Consequently, various recent research efforts are actively seeking countermeasures to SGX side-channel attacks. It is widely assumed that SGX may be vulnerable to other side channels, such as cache access pattern monitoring,as well. However, prior to our work, the practicality and the extent of such information leakage was not studied.In this paper we demonstrate that cache-based attacks are indeed a serious threat to the confidentiality of SGX-protected programs. Our goal was to design an attack that is hard to mitigate using known defenses, and there-fore we mount our attack without interrupting enclave execution. This approach has major technical challenges,since the existing cache monitoring techniques experience significant noise if the victim process is not interrupted. We designed and implemented novel attack techniques to reduce this noise by leveraging the capabilities of the privileged adversary. Our attacks are able to recover confidential information from SGX enclaves,which we illustrate in two example cases: extraction of an entire RSA-2048 key during RSA decryption, and detection of specific human genome sequences during genomic indexing. We show that our attacks are more effective than previous cache attacks and harder to mitigate than previous SGX side-channel attacks.
%0 Journal Article
%1 206170
%A Brasser, Ferdinand
%A Mller, Urs
%A Dmitrienko, Alexandra
%A Kostiainen, Kari
%A Capkun, Srdjan
%A Sadeghi, Ahmad-Reza
%B In 11th USENIX Workshop on Offensive Technologies (WOOT 17)
%C Vancouver, BC
%D 2017
%K Attacks SGX myown
%T Software grand exposure: SGX cache attacks are practical
%U https://www.usenix.org/conference/woot17/workshop-program/presentation/brasser
%X Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns. Consequently, various recent research efforts are actively seeking countermeasures to SGX side-channel attacks. It is widely assumed that SGX may be vulnerable to other side channels, such as cache access pattern monitoring,as well. However, prior to our work, the practicality and the extent of such information leakage was not studied.In this paper we demonstrate that cache-based attacks are indeed a serious threat to the confidentiality of SGX-protected programs. Our goal was to design an attack that is hard to mitigate using known defenses, and there-fore we mount our attack without interrupting enclave execution. This approach has major technical challenges,since the existing cache monitoring techniques experience significant noise if the victim process is not interrupted. We designed and implemented novel attack techniques to reduce this noise by leveraging the capabilities of the privileged adversary. Our attacks are able to recover confidential information from SGX enclaves,which we illustrate in two example cases: extraction of an entire RSA-2048 key during RSA decryption, and detection of specific human genome sequences during genomic indexing. We show that our attacks are more effective than previous cache attacks and harder to mitigate than previous SGX side-channel attacks.
@article{206170,
abstract = {Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns. Consequently, various recent research efforts are actively seeking countermeasures to SGX side-channel attacks. It is widely assumed that SGX may be vulnerable to other side channels, such as cache access pattern monitoring,as well. However, prior to our work, the practicality and the extent of such information leakage was not studied.In this paper we demonstrate that cache-based attacks are indeed a serious threat to the confidentiality of SGX-protected programs. Our goal was to design an attack that is hard to mitigate using known defenses, and there-fore we mount our attack without interrupting enclave execution. This approach has major technical challenges,since the existing cache monitoring techniques experience significant noise if the victim process is not interrupted. We designed and implemented novel attack techniques to reduce this noise by leveraging the capabilities of the privileged adversary. Our attacks are able to recover confidential information from SGX enclaves,which we illustrate in two example cases: extraction of an entire RSA-2048 key during RSA decryption, and detection of specific human genome sequences during genomic indexing. We show that our attacks are more effective than previous cache attacks and harder to mitigate than previous SGX side-channel attacks.},
added-at = {2020-08-20T11:48:33.000+0200},
address = {Vancouver, BC},
author = {Brasser, Ferdinand and Mller, Urs and Dmitrienko, Alexandra and Kostiainen, Kari and Capkun, Srdjan and Sadeghi, Ahmad-Reza},
biburl = {https://www.bibsonomy.org/bibtex/2eb183582f46189214a3332992e3565b5/sssgroup},
booktitle = {In 11th USENIX Workshop on Offensive Technologies (WOOT 17)},
institution = {USENIX Association},
interhash = {287aa95c04b7276b683b0bd292cdd3bf},
intrahash = {eb183582f46189214a3332992e3565b5},
keywords = {Attacks SGX myown},
month = aug,
timestamp = {2022-12-18T22:18:36.000+0100},
title = {Software grand exposure: SGX cache attacks are practical},
url = {https://www.usenix.org/conference/woot17/workshop-program/presentation/brasser},
year = 2017
}