Malware Guard Extension: Using SGX to Conceal Cache Attacks

作者: Michael Schwarz , Samuel Weiser , Daniel Gruss , Clémentine Maurice , Stefan Mangard

DOI: 10.1007/978-3-319-60876-1_1

关键词:

摘要: In modern computer systems, user processes are isolated from each other by the operating system and hardware. Additionally, in a cloud scenario it is crucial that hypervisor isolates tenants co-located on same physical machine. However, does not protect against provider thus supplied Intel SGX provides mechanism addresses this scenario. It aims at protecting user-level software attacks processes, system, even attackers.

参考文章(41)
Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar, Wait a Minute! A fast, Cross-VM Attack on AES recent advances in intrusion detection. pp. 299- 319 ,(2014) , 10.1007/978-3-319-11379-1_15
Cyril Arnaud, Pierre-Alain Fouque, Timing attack against protected RSA-CRT implementation used in PolarSSL the cryptographers track at the rsa conference. pp. 18- 33 ,(2013) , 10.1007/978-3-642-36095-4_2
Yuval Yarom, Katrina Falkner, None, FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack usenix security symposium. pp. 719- 732 ,(2014)
Leonardo de Moura, Nikolaj Bjørner, Z3: an efficient SMT solver tools and algorithms for construction and analysis of systems. pp. 337- 340 ,(2008) , 10.1007/978-3-540-78800-3_24
Dag Arne Osvik, Adi Shamir, Eran Tromer, Cache attacks and countermeasures: the case of AES the cryptographers track at the rsa conference. pp. 1- 20 ,(2006) , 10.1007/11605805_1
Johannes Blömer, Alexander May, New Partial Key Exposure Attacks on RSA Advances in Cryptology - CRYPTO 2003. pp. 27- 43 ,(2003) , 10.1007/978-3-540-45146-4_2
Eli Biham, A Fast New DES Implementation in Software fast software encryption. pp. 260- 272 ,(1997) , 10.1007/BFB0052352
Stefan Mangard, Raphael Spreitzer, Daniel Gruss, Cache template attacks: automating attacks on inclusive last-level caches usenix security symposium. pp. 897- 912 ,(2015)
Felix Schuster, Manuel Costa, Cedric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich, VC3: Trustworthy Data Analytics in the Cloud Using SGX ieee symposium on security and privacy. pp. 38- 54 ,(2015) , 10.1109/SP.2015.10
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9