Security Vulnerabilities of SGX and Countermeasures: A Survey

被引:50
|
作者
Fei, Shufan [1 ]
Yan, Zheng [1 ,2 ]
Ding, Wenxiu [1 ]
Xie, Haomeng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab ISN, 266 Xinglong Sect Xifeng Rd, Xian 710126, Shaanxi, Peoples R China
[2] Aalto Univ, Sch Elect Engn, Dept Commun & Networking, Konemiehentie 2,POB 15400, Espoo 02150, Finland
基金
中国博士后科学基金; 芬兰科学院; 中国国家自然科学基金;
关键词
Trusted execution environment; side-channel attacks; security; trustworthiness; SIDE-CHANNEL ATTACKS; ACCESS-CONTROL; ENCRYPTION;
D O I
10.1145/3456631
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of the most representative TEEs that creates an isolated environment on an untrusted operating system, thus providing run-time protection for the execution of security-critical code and data. However, Intel SGX is far from the acme of perfection. It has become a target of various attacks due to its security vulnerabilities. Researchers and practitioners have paid attention to the security vulnerabilities of SGX and investigated optimization solutions in real applications. Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap. Specifically, we propose two sets of criteria for estimating security risks of existing attacks and evaluating defense effects brought by attack countermeasures. Furthermore, we propose a taxonomy of SGX security vulnerabilities and shed light on corresponding attack vectors. After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria. At last, on the strength of our survey, we propose some open challenges and future directions in the research of SGX security.
引用
收藏
页数:36
相关论文
共 50 条
  • [1] Security Vulnerabilities and Countermeasures of Smart Contracts: A Survey
    Sifra, Epherem Merete
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 512 - 515
  • [2] A survey of common security vulnerabilities and corresponding countermeasures for SaaS
    Kim, Donghoon
    Vouk, Mladen A.
    [J]. 2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 59 - 63
  • [3] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    [J]. COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48
  • [4] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [5] Wireless security: Vulnerabilities and countermeasures
    Johnson, DM
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 91 - 91
  • [6] Security Vulnerabilities and Countermeasures in MPSoCs
    Sant'Ana, Anderson Camargo
    Medina, Henrique
    Moraes, Fernando Gehm
    [J]. IEEE DESIGN & TEST, 2021, 38 (04) : 70 - 77
  • [7] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    [J]. INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [8] Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey
    Jaitly, Sunakshi
    Malhotra, Harshit
    Bhushan, Bharat
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 559 - 564
  • [9] A Survey on Web Application Vulnerabilities and Countermeasures
    Atashzar, Hasty
    Torkaman, Atefeh
    Bahrololum, Marjan
    Tadayon, Mohammad H.
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 647 - 652
  • [10] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644