MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape

被引:5
|
作者
Lang, Fan [1 ]
Wang, Wei [1 ]
Meng, Lingjia [1 ]
Lin, Jingqiang [2 ]
Wang, Qiongxiao [1 ]
Lu, Linli [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Sci & Technol China, Sch Cyber Secur, Hefei, Anhui, Peoples R China
基金
国家重点研发计划;
关键词
Software Guard eXtension; Transactional Synchronization Extension; Side-channel attack; transient execution attack;
D O I
10.1145/3564625.3568002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous works have experimentally shown that Intel Software Guard eXtensions (SGX) is vulnerable to side-channel attacks (SCAs) and related threats, including transient execution attacks. These threats compromise the security of SGX-protected apps. Obfuscating data access patterns is a realistic way to guard against these threats. However, existing defenses impose either too much performance overhead or additional usage restrictions (such as multithreading). Furthermore, these obfuscation schemes may no longer work if the attacker has the capacity to single-step the target application. In this paper, we propose MoLE, a dynamic data location randomization scheme to defend against SCAs and transient execution attacks that target sensitive data within enclaves. By continuously obfuscating the location of sensitive data at runtime, MoLE prevents the adversary from directly obtaining or disclosing data based on data access patterns. MoLE makes use of Transactional Synchronization Extensions (TSX), an Intel CPU feature intended for efficiency in concurrent scenarios, to prevent the adversary from tracking sensitive data by single-stepping enclaved execution. MoLE can also be applied in multi-threaded scenarios under the protection of TSX. We implement MoLE as a semi-automatic compiler-based tool. Evaluation results show that MoLE is practical, offering a tunable trade-off between security and performance.
引用
收藏
页码:978 / 988
页数:11
相关论文
共 50 条
  • [21] The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
    Maria Mushtaq
    Muhammad Muneeb Yousaf
    Muhammad Khurram Bhatti
    Vianney Lapotre
    Guy Gogniat
    Annals of Telecommunications, 2022, 77 : 731 - 747
  • [22] Practical Side-Channel Attacks against WPA-TKIP
    Schepers, Domien
    Ranganathan, Aanjhan
    Vanhoef, Mathy
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 415 - 426
  • [23] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 471 - 475
  • [24] A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
    Abdulgadir, Abubakr
    Mohajerani, Kamyar
    Dang, Viet Ba
    Kaps, Jens-Peter
    Gaj, Kris
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 224 - 245
  • [25] Hardening Embedded Networking Devices Against Side-Channel Attacks
    Liu, Donggang
    Dong, Qi
    AD HOC & SENSOR WIRELESS NETWORKS, 2011, 12 (1-2) : 103 - 124
  • [26] FPGA implementations of SPRING and their countermeasures against side-channel attacks
    Brenner, Hai
    Gaspar, Lubos
    Leurent, Gaëetan
    Rosen, Alon
    Standaert, François-Xavier
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 414 - 432
  • [27] Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks
    Zooker, David
    Elkoni, Matan
    Shalom, Or Ohev
    Weizman, Yoav
    Levi, Itamar
    Keren, Osnat
    Fish, Alexander
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [28] Formal Verification of Software Countermeasures against Side-Channel Attacks
    Eldib, Hassan
    Wang, Chao
    Schaumont, Patrick
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
  • [29] TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
    Li, Mengming
    Bu, Kai
    Miao, Chenlu
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4574 - 4588
  • [30] Mitigating EM Side-Channel Attacks with Dynamic Delay Insertion and Data Bus Inversion
    Jiang, Minmin
    Maragkoudaki, Eleni
    Pavlidis, Vasilis F.
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 1724 - 1728