首页> 外文OA文献 >Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution
【2h】

Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution

机译:在没有页面错误的情况下告诉您的秘密:秘密执行基于页面表的攻击

摘要

Protected module architectures, such as Intel SGX, enable strong trusted computing guarantees for hardware-enforced enclaves on top a potentially malicious operating system. However, such enclaved execution environments are known to be vulnerable to a powerful class of controlled-channel attacks. Recent research convincingly demonstrated that adversarial system software can extract sensitive data from enclaved applications by carefully revoking access rights on enclave pages, and recording the associated page faults. As a response, a number of state-of-the-art defense techniques has been proposed that suppress page faults during enclave execution.This paper shows, however, that page table-based threats go beyond page faults. We demonstrate that an untrusted operating system can observe enclave page accesses without resorting to page faults, by exploiting other side-effects of the address translation process. We contribute two novel attack vectors that infer enclaved memory accesses from page table attributes, as well as from the caching behavior of unprotected page table memory. We demonstrate the effectiveness of our attacks by recovering EdDSA session keys with little to no noise from the popular Libgcrypt cryptographic software suite.
机译:受保护的模块体系结构(例如Intel SGX)为潜在的恶意操作系统之上的硬件强制保护区提供了强大的可信计算保证。但是,已知这种封闭式执行环境容易受到强大的受控通道攻击。最近的研究令人信服地表明,对抗性系统软件可以通过仔细撤消对飞地页面的访问权限并记录相关的页面错误,来从飞地应用程序中提取敏感数据。作为回应,已经提出了许多先进的防御技术来抑制飞地执行过程中的页面错误。但是,本文表明基于页面表的威胁已经超越了页面错误。我们证明,通过利用地址转换过程的其他副作用,不受信任的操作系统可以在不使用页面错误的情况下观察特定区域的页面访问。我们贡献了两种新颖的攻击媒介,它们可以根据页表属性以及不受保护的页表内存的缓存行为来推断安全区域的内存访问。我们通过从流行的Libgcrypt加密软件套件中恢复很少甚至没有噪音的EdDSA会话密钥来证明攻击的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号