13
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Interface-Based Side Channel Attack Against Intel SGX

      Preprint
      , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Intel has introduced a trusted computing technology, Intel Software Guard Extension (SGX), which provides an isolated and secure execution environment called enclave for a user program without trusting any privilege software (e.g., an operating system or a hypervisor) or firmware. Nevertheless, SGX is vulnerable to several side channel attacks (e.g. page-fault-based attack and cache-based attack). In this paper, we explore a new, yet critical side channel attack in SGX, interface-based side channel attack, which can infer the information of the enclave input data. The root cause of the interface-based side channel attack is the input dependent interface invocation information (e.g., interface information and invocation patterns) which can be observed by the untrusted privilege software can reveal the control flow in the enclave. We study the methodology which can be used to conduct the interface-based side channel attack. To illustrate the effectiveness of the interface-based side-channel attacks, we use our methodology to infer whether tracked web pages have been processed by the SGX-assisted NFV platforms and achieve the accuracy of 87.6% and recall of 76.6%. We also identify the packets which belong to the tracked web pages, with the accuracy of 67.9%and recall of 71.1%. We finally propose some countermeasures to defense the interface-based side channel attack in SGX-assisted applications.

          Related collections

          Most cited references10

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Survey and taxonomy of IP address lookup algorithms

                Bookmark

                Author and article information

                Journal
                07 October 2018
                Article
                1811.05378
                2bff4e54-bd19-48d7-8ef5-c2d0934c64c6

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article