MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape

被引:5
|
作者
Lang, Fan [1 ]
Wang, Wei [1 ]
Meng, Lingjia [1 ]
Lin, Jingqiang [2 ]
Wang, Qiongxiao [1 ]
Lu, Linli [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Sci & Technol China, Sch Cyber Secur, Hefei, Anhui, Peoples R China
来源
PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022 | 2022年
基金
国家重点研发计划;
关键词
Software Guard eXtension; Transactional Synchronization Extension; Side-channel attack; transient execution attack;
D O I
10.1145/3564625.3568002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous works have experimentally shown that Intel Software Guard eXtensions (SGX) is vulnerable to side-channel attacks (SCAs) and related threats, including transient execution attacks. These threats compromise the security of SGX-protected apps. Obfuscating data access patterns is a realistic way to guard against these threats. However, existing defenses impose either too much performance overhead or additional usage restrictions (such as multithreading). Furthermore, these obfuscation schemes may no longer work if the attacker has the capacity to single-step the target application. In this paper, we propose MoLE, a dynamic data location randomization scheme to defend against SCAs and transient execution attacks that target sensitive data within enclaves. By continuously obfuscating the location of sensitive data at runtime, MoLE prevents the adversary from directly obtaining or disclosing data based on data access patterns. MoLE makes use of Transactional Synchronization Extensions (TSX), an Intel CPU feature intended for efficiency in concurrent scenarios, to prevent the adversary from tracking sensitive data by single-stepping enclaved execution. MoLE can also be applied in multi-threaded scenarios under the protection of TSX. We implement MoLE as a semi-automatic compiler-based tool. Evaluation results show that MoLE is practical, offering a tunable trade-off between security and performance.
引用
收藏
页码:978 / 988
页数:11
相关论文
共 50 条
  • [31] How secure is your cache against side-channel attacks?
    He, Zecheng
    Lee, Ruby B.
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 341 - 353
  • [32] Closing Leaks: Routing Against Crosstalk Side-Channel Attacks
    Seifoori, Zeinab
    Mirzargar, Seyedeh Sharareh
    Stojilovic, Mirjana
    2020 ACM/SIGDA INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE GATE ARRAYS (FPGA '20), 2020, : 197 - 203
  • [33] FPGA Implementations of SPRING And Their Countermeasures against Side-Channel Attacks
    Brenner, Hai
    Gaspar, Lubos
    Leurent, Gaetan
    Rosen, Alon
    Standaert, Francois-Xavier
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 414 - 432
  • [34] Masking against Side-Channel Attacks: A Formal Security Proof
    Prouff, Emmanuel
    Rivain, Matthieu
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 142 - 159
  • [35] Automated Software Protection for the Masses Against Side-Channel Attacks
    Belleville, Nicolas
    Courousse, Damien
    Heydemann, Karine
    Charles, Henri-Pierre
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 15 (04)
  • [36] Timing Side-Channel Mitigation via Automated Program Repair
    Ruan, Haifeng
    Noller, Yannic
    Tizpaz-Niari, Saeid
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (08)
  • [37] RFET-based Dynamic Differential Logic Cells Against Power Side-Channel Attacks
    Kavand, Nima
    Darjani, Armin
    Chhabra, Garvit
    Kumar, Akash
    2024 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2024, : 136 - 142
  • [38] Side-Channel Attacks on Query-Based Data Anonymization
    Boenisch, Franziska
    Munz, Reinhard
    Tiepelt, Marcel
    Hanisch, Simon
    Kuhn, Christiane
    Francis, Paul
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 1254 - 1265
  • [39] Modeling The Side-Channel Attacks in Data Deduplication with Game Theory
    Wang, Bing
    Lou, Wenjing
    Hou, Y. Thomas
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 200 - 208
  • [40] MEAS: memory encryption and authentication secure against side-channel attacks
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 137 - 158