Abstract
Intel SGX is a power technology designed to establish a trusted execution environment on processors. Despite its promising features, there are various potential attack surfaces like the Performance Monitoring Unit (PMU) that could be exploited to extract security-sensitive data from SGX enclaves. To address this security threat, Intel has introduced anti side-channel interface (ASCI) that disables the PMU when an SGX enclave is running. However, little attention has been paid to performing the security evaluation of the ASCI feature, leaving the possibility of reviving such an attack. In this paper, we study if Intel’s ASCI feature truly hides the internal execution state of SGX enclaves from the PMU to completely eliminate PMU-driven attack surfaces. To achieve this, we design a novel framework that investigates the effect of the running enclave on all possible performance monitoring events. The key idea of our framework is to (i) analyze the linearity between the number of instructions executed within an enclave and the corresponding measured events and (ii) perform single-stepping and zero-stepping attacks with performance monitoring events. Our security evaluation demonstrates that SGX enclave does not leave any footprint on PMUs, except for opt-in (i.e., debug) enclave where a hardware-based protection mechanism is not supported.
| Original language | English |
|---|---|
| Title of host publication | ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security |
| Publisher | Association for Computing Machinery, Inc |
| Pages | 1952-1954 |
| Number of pages | 3 |
| ISBN (Electronic) | 9798400704826 |
| DOIs | |
| Publication status | Published - 2024 Jul 1 |
| Event | 19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024 - Singapore, Singapore Duration: 2024 Jul 1 → 2024 Jul 5 |
Publication series
| Name | ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security |
|---|
Conference
| Conference | 19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024 |
|---|---|
| Country/Territory | Singapore |
| City | Singapore |
| Period | 24/7/1 → 24/7/5 |
Bibliographical note
Publisher Copyright:© 2024 Copyright held by the owner/author(s).
Keywords
- Intel SGX
- Performance monitoring event
- Side-channel attack
ASJC Scopus subject areas
- Computational Theory and Mathematics
- Computer Networks and Communications
- Computer Science Applications
Fingerprint
Dive into the research topics of 'POSTER: On the Feasibility of Inferring SGX Execution through PMU'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS