2016
DOI: 10.1007/978-3-319-45744-4_22
|View full text |Cite
|
Sign up to set email alerts
|

AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves

Abstract: Abstract. Intel's Software Guard Extensions (SGX) provide a new hardware-based trusted execution environment on Intel CPUs using secure enclaves that are resilient to accesses by privileged code and physical attackers. Originally designed for securing small services, SGX bears promise to protect complex, possibly cloud-hosted, legacy applications. In this paper, we show that previously considered harmless synchronisation bugs can turn into severe security vulnerabilities when using SGX. By exploiting use-after… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
84
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 138 publications
(87 citation statements)
references
References 22 publications
(16 reference statements)
0
84
0
Order By: Relevance
“…SGX is a novel technology under continuous development and intense security research scrutiny. [20] exposes vulnerability exploits synchronization bugs to circumvent the security guarantees of SGX and to hijack the control flow of the enclave code or even bypass access control mechanisms. In [21], Buhren et al described a so-called fault attack, allowing an attacker to change the contents of the RAM encrypted area.…”
Section: Related Workmentioning
confidence: 99%
“…SGX is a novel technology under continuous development and intense security research scrutiny. [20] exposes vulnerability exploits synchronization bugs to circumvent the security guarantees of SGX and to hijack the control flow of the enclave code or even bypass access control mechanisms. In [21], Buhren et al described a so-called fault attack, allowing an attacker to change the contents of the RAM encrypted area.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, side-channel attacks [37,36] based on vulnerabilities of the application running inside the enclave are not of interest: We assume all enclave software to be free of security-relevant bugs. Finally, we assume the design and implementation of SGX itself, including all cryptographic operations is secure and does not contain any vulnerabilities.…”
Section: Sgx-aware Threat Modelmentioning
confidence: 99%
“…We now turn to the exploitation of concurrency bugs for the purpose of violating enclave integrity as demonstrated by Weichbrodt et al [13]. The attack proceeded by widening the window of vulnerability during which race conditions Figure 4: use-after-free concurrency bug lead to wrong synchronization behavior.…”
Section: Concurrency Bugsmentioning
confidence: 99%
“…However, running critical sections under DP protection helps preventing the exploitation of these bugs. We illustrate this on the example of the use-after-free concurrency bug from [13], which we depict in Fig. 4.…”
Section: Concurrency Bugsmentioning
confidence: 99%
See 1 more Smart Citation