SG XL
- 30 December 2020
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Architecture and Code Optimization
- Vol. 18 (1), 1-25
- https://doi.org/10.1145/3433983
Abstract
Intel’s SGX architecture offers clients of public cloud computing platforms the ability to create hardware-protected enclaves whose contents are protected from privileged system software. However, SGX relies on system software for enclave memory management. In a sequence of recent papers, researchers have demonstrated that this reliance allows a malicious OS/hypervisor to snoop on the page addresses being accessed from within an enclave via various channels. This page address stream can then be used to infer secrets if the enclave’s page access pattern depends upon the secret and this constitutes an important class of side-channels. We propose SGXL, a hardware-software co-designed system that significantly increases the difficulty of any page address-based side-channels through the use of large pages. A large page maps address ranges at a much larger granularity than the default page size (at least 512× larger). SGXL thus significantly lowers resolution of the leaked page address stream and could practically throttle all flavors of page-address based side-channels. We detail the modifications needed to SGX’s software stack and the (minor) hardware enhancements required for SGXL to guarantee the use of large pages in the presence of adversarial system software. We empirically show that SGXL could be one of those rare systems that enhances security with the potential of improving performance as well.Keywords
This publication has 7 references indexed in Scilit:
- Klotski: Efficient Obfuscated Execution against Controlled-Channel AttacksPublished by Association for Computing Machinery (ACM) ,2020
- SOK: (State of) The Art of War: Offensive Techniques in Binary AnalysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Driller: Augmenting Fuzzing Through Selective Symbolic ExecutionPublished by Internet Society ,2016
- Shielding Applications from an Untrusted Cloud with HavenACM Transactions on Computer Systems, 2015
- Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary FirmwarePublished by Internet Society ,2015
- Innovative instructions and software model for isolated executionPublished by Association for Computing Machinery (ACM) ,2013
- Using innovative instructions to create trustworthy software solutionsPublished by Association for Computing Machinery (ACM) ,2013