MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape

被引:5
|
作者
Lang, Fan [1 ]
Wang, Wei [1 ]
Meng, Lingjia [1 ]
Lin, Jingqiang [2 ]
Wang, Qiongxiao [1 ]
Lu, Linli [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Sci & Technol China, Sch Cyber Secur, Hefei, Anhui, Peoples R China
基金
国家重点研发计划;
关键词
Software Guard eXtension; Transactional Synchronization Extension; Side-channel attack; transient execution attack;
D O I
10.1145/3564625.3568002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous works have experimentally shown that Intel Software Guard eXtensions (SGX) is vulnerable to side-channel attacks (SCAs) and related threats, including transient execution attacks. These threats compromise the security of SGX-protected apps. Obfuscating data access patterns is a realistic way to guard against these threats. However, existing defenses impose either too much performance overhead or additional usage restrictions (such as multithreading). Furthermore, these obfuscation schemes may no longer work if the attacker has the capacity to single-step the target application. In this paper, we propose MoLE, a dynamic data location randomization scheme to defend against SCAs and transient execution attacks that target sensitive data within enclaves. By continuously obfuscating the location of sensitive data at runtime, MoLE prevents the adversary from directly obtaining or disclosing data based on data access patterns. MoLE makes use of Transactional Synchronization Extensions (TSX), an Intel CPU feature intended for efficiency in concurrent scenarios, to prevent the adversary from tracking sensitive data by single-stepping enclaved execution. MoLE can also be applied in multi-threaded scenarios under the protection of TSX. We implement MoLE as a semi-automatic compiler-based tool. Evaluation results show that MoLE is practical, offering a tunable trade-off between security and performance.
引用
收藏
页码:978 / 988
页数:11
相关论文
共 50 条
  • [1] On the Challenges of Detecting Side-Channel Attacks in SGX
    Jiang, Jianyu
    Soriente, Claudio
    Karame, Ghassan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 86 - 98
  • [2] A Proactive Defense Strategy Against SGX Side-channel Attacks via self-checking DRL in the Cloud
    Ma, Tengchao
    Xu, Changqiao
    An, Qingzhao
    Kuang, Xiaohui
    Zhong, Lujie
    Grieco, Luigi Alfredo
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 4174 - 4179
  • [3] DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
    Brasser, Ferdinand
    Capkun, Srdjan
    Dmitrienko, Alexandra
    Frassetto, Tommaso
    Kostiainen, Kari
    Sadeghi, Ahmad-Reza
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 788 - 800
  • [4] Varys Protecting SGX Enclaves From Practical Side-Channel Attacks
    Oleksenko, Oleksii
    Trach, Bohdan
    Krahn, Robert
    Martin, Andre
    Fetzer, Christof
    Silberstein, Mark
    PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, 2018, : 227 - 239
  • [5] A Survey of of Side-Channel Attacks and Mitigation for Processor Interconnects
    Yuan, Jie
    Zhang, Jing
    Qiu, Pengfei
    Wei, Xinghai
    Liu, Dongxiao
    APPLIED SCIENCES-BASEL, 2024, 14 (15):
  • [6] Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks
    Cui, Aijiao
    Luo, Yanhui
    Chang, Chip-Hong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) : 363 - 376
  • [7] On the Correctness of an Approach against Side-Channel Attacks
    Wang, Peng
    Feng, Dengguo
    Wu, Wenling
    Zhang, Liting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
  • [8] MemWander: Memory Dynamic Remapping via Hypervisor Against Cache-Based Side-Channel Attacks
    Yang, Chao
    Guo, Yunfei
    Hu, Hongchao
    IEEE ACCESS, 2019, 7 : 2179 - 2199
  • [9] Protecting integrated circuits against side-channel and fault attacks with dynamic encoding
    Montoya, Maxime
    Bacles-Min, Simone
    Molnos, Anca
    Fournier, Jacques J. A.
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 97
  • [10] Side-Channel Payload Attacks: Modeling, Demonstration, and Mitigation Strategies
    Byerly, Adam
    Hennig, Anthony
    2024 IEEE AEROSPACE CONFERENCE, 2024,