中文版 | English
题名

ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX

作者
DOI
发表日期
2022
会议名称
IEEE International Symposium on Secure and Private Execution Environment Design (SEED)
ISBN
978-1-6654-8527-2
会议录名称
页码
145-156
会议日期
26-27 Sept. 2022
会议地点
Storrs, CT, USA
出版地
10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
出版者
摘要
Trusted Execution Environment (TEE) is the cornerstone of confidential computing. Among other TEEs, Intel (R) Secure Guard Extensions (Intel (R) SGX) is the most prominent solution that is frequently used in the public cloud to provide confidential computing services. Intel (R) SGX promotes runtime confidentiality and integrity of enclaves with minimal modifications to existing CPU microarchitectures. However, Transient Execution Attacks, such as L1 Terminal Fault (L1TF), Microarchitectural Data Sampling (MDS), and Transactional Asynchronous Abort (TAA) have exposed certain vulnerabilities within Intel (R) SGX solution. Over the past few years, Intel has developed various countermeasures against most of these vulnerabilities via microcode updates and hardware fixes. However, arguably, there are no existing tools nor studies that can measurably verify the effectiveness of these countermeasures. In this paper, we introduce an automated analysis tool, called ENCLYZER, to evaluate Transient Execution Vulnerabilities on Intel (R) SGX. We leverage ENCLYZER to comprehensively analyze a set of processors, with multiple versions of their microcode, to verify the correctness of these countermeasures. Our empirical analysis suggests that most countermeasures are effective in preventing attacks that are initiated from the same CPU hyperthread, but less effective for cross-thread attacks. Therefore, the application of the latest microcode patches and disabling hyperthreading is warranted to enhance the security of Intel (R) SGX-enabled systems. Security Configurations like hyperthreading disabled/enabled are attestable on Intel (R) SGX platform to provide user with increased confidence in making decision on system trustworthiness. Note that the Security Configurations cannot be modified without a system reboot.
关键词
学校署名
第一
语种
英语
相关链接[IEEE记录]
收录类别
WOS研究方向
Computer Science ; Engineering
WOS类目
Computer Science, Hardware & Architecture ; Computer Science, Information Systems ; Computer Science, Theory & Methods ; Engineering, Electrical & Electronic
WOS记录号
WOS:000889465400013
来源库
IEEE
全文链接https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9935016
引用统计
被引频次[WOS]:2
成果类型会议论文
条目标识符http://sustech.caswiz.com/handle/2SGJ60CL/412120
专题南方科技大学
作者单位
1.Southern University of Science and Technology
2.Intel Labs
3.The Ohio State University
第一作者单位南方科技大学
第一作者的第一单位南方科技大学
推荐引用方式
GB/T 7714
Jiuqin Zhou,Yuan Xiao,Radu Teodorescu,et al. ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX[C]. 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA:IEEE COMPUTER SOC,2022:145-156.
条目包含的文件
条目无相关文件。
个性服务
原文链接
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
导出为Excel格式
导出为Csv格式
Altmetrics Score
谷歌学术
谷歌学术中相似的文章
[Jiuqin Zhou]的文章
[Yuan Xiao]的文章
[Radu Teodorescu]的文章
百度学术
百度学术中相似的文章
[Jiuqin Zhou]的文章
[Yuan Xiao]的文章
[Radu Teodorescu]的文章
必应学术
必应学术中相似的文章
[Jiuqin Zhou]的文章
[Yuan Xiao]的文章
[Radu Teodorescu]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
[发表评论/异议/意见]
暂无评论

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。