solimusical.blogg.se

Panoply sgx
Panoply sgx





  1. PANOPLY SGX SOFTWARE
  2. PANOPLY SGX CODE

This paper demonstrates that these concerns are exaggerated, and that a fully-featured library OS can rapidly deploy unmodified applications on SGX with overheads comparable to applications modified to use "shim" layers.

panoply sgx panoply sgx

PANOPLY SGX CODE

Although previous work has shown that a library OS can execute unmodified applications on SGX, a belief has developed that a library OS will be ruinous for performance and TCB size, making application code modification an implicit prerequisite to adopting SGX. Unfortunately, current applications will not work out-of-the-box on SGX. In cloud computing and other systems, many users and applications could benefit from SGX. Finally, we thoroughly study the feasibility of hardware-based solutions (i.e., branch history flushing) and propose a software-based approach that mitigates the attack.read more read lessĪbstract: Intel SGX hardware enables applications to protect themselves from potentially-malicious OSes or hypervisors. An evaluation against RSA shows that our attack infers each private key bit with 99.8% accuracy. To overcome these challenges, we develop two novel exploitation techniques: 1) a last branch record (LBR)-based history-inferring technique and 2) an advanced programmable interrupt controller (APIC)-based technique to control the execution of an enclave in a finegrained manner. However, exploiting this channel in practice is challenging because 1) measuring branch execution time is too noisy for distinguishing fine-grained controlflow changes and 2) pausing an enclave right after it has executed the code block we target requires sophisticated control. The root cause of this attack is that SGX does not clear branch history when switching from enclave to nonenclave mode, leaving fine-grained traces for the outside world to observe, which gives rise to a branch-prediction side channel. In this paper, we explore a new, yet critical, side-channel attack, branch shadowing, that reveals fine-grained control flows (branch granularity) in an enclave. However, the attack only reveals page-level memory accesses within an enclave. Researchers have demonstrated that SGX is vulnerable to a page-fault-based attack.

PANOPLY SGX SOFTWARE

Abstract: Intel has introduced a hardware-based trusted execution environment, Intel Software Guard Extensions (SGX), that provides a secure, isolated execution environment, or enclave, for a user program without trusting any underlying software (e.g., an operating system) or firmware.







Panoply sgx