Security Vulnerabilities of SGX and Countermeasures: A Survey

被引:50
|
作者
Fei, Shufan [1 ]
Yan, Zheng [1 ,2 ]
Ding, Wenxiu [1 ]
Xie, Haomeng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab ISN, 266 Xinglong Sect Xifeng Rd, Xian 710126, Shaanxi, Peoples R China
[2] Aalto Univ, Sch Elect Engn, Dept Commun & Networking, Konemiehentie 2,POB 15400, Espoo 02150, Finland
基金
中国博士后科学基金; 芬兰科学院; 中国国家自然科学基金;
关键词
Trusted execution environment; side-channel attacks; security; trustworthiness; SIDE-CHANNEL ATTACKS; ACCESS-CONTROL; ENCRYPTION;
D O I
10.1145/3456631
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of the most representative TEEs that creates an isolated environment on an untrusted operating system, thus providing run-time protection for the execution of security-critical code and data. However, Intel SGX is far from the acme of perfection. It has become a target of various attacks due to its security vulnerabilities. Researchers and practitioners have paid attention to the security vulnerabilities of SGX and investigated optimization solutions in real applications. Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap. Specifically, we propose two sets of criteria for estimating security risks of existing attacks and evaluating defense effects brought by attack countermeasures. Furthermore, we propose a taxonomy of SGX security vulnerabilities and shed light on corresponding attack vectors. After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria. At last, on the strength of our survey, we propose some open challenges and future directions in the research of SGX security.
引用
收藏
页数:36
相关论文
共 50 条
  • [21] Analysis of Security Features in DLMS/COSEM: Vulnerabilities and Countermeasures
    Luering, Norman
    Szameitat, Daniel
    Hoffmann, Stefan
    Bumiller, Gerd
    [J]. 2018 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2018,
  • [22] Software Security: Vulnerabilities and Countermeasures for Two Attacker Models
    Piessens, Frank
    Verbauwhede, Ingrid
    [J]. PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 990 - 999
  • [23] Security Concerns in Smart Grids: Threats, Vulnerabilities and Countermeasures
    Khelifa, Benahmed
    Abla, Smahi
    [J]. PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC'15), 2015, : 772 - 777
  • [24] Security Vulnerabilities of Emerging Nonvolatile Main Memories and Countermeasures
    Kannan, Sachhidh
    Karimi, Naghmeh
    Sinanoglu, Ozgur
    Karri, Ramesh
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (01) : 2 - 15
  • [25] Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security
    Kumar, Naveen
    Chaudhary, Ankit
    [J]. COMPUTER NETWORKS, 2024, 252
  • [26] Experiments and countermeasures of security vulnerabilities on next generation network
    Kim, Jeong-Wook
    Cho, Hyug-Hyun
    Mun, Gil-Jong
    Seo, Jae-Hyun
    Noh, Bong-Nam
    Kim, Yong-Min
    [J]. PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 562 - +
  • [27] A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
    Obaidat, Muath A.
    Obeidat, Suhaib
    Holst, Jennifer
    Al Hayajneh, Abdullah
    Brown, Joseph
    [J]. COMPUTERS, 2020, 9 (02)
  • [28] Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A Survey
    Sinha, Preeti
    Jha, V. K.
    Rai, Amit Kumar
    Bhushan, Bharat
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 288 - 293
  • [29] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
    Barrowclough, John Patrick
    Asif, Rameez
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [30] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530