Security Vulnerabilities of SGX and Countermeasures: A Survey

被引:50
|
作者
Fei, Shufan [1 ]
Yan, Zheng [1 ,2 ]
Ding, Wenxiu [1 ]
Xie, Haomeng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab ISN, 266 Xinglong Sect Xifeng Rd, Xian 710126, Shaanxi, Peoples R China
[2] Aalto Univ, Sch Elect Engn, Dept Commun & Networking, Konemiehentie 2,POB 15400, Espoo 02150, Finland
基金
中国博士后科学基金; 芬兰科学院; 中国国家自然科学基金;
关键词
Trusted execution environment; side-channel attacks; security; trustworthiness; SIDE-CHANNEL ATTACKS; ACCESS-CONTROL; ENCRYPTION;
D O I
10.1145/3456631
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of the most representative TEEs that creates an isolated environment on an untrusted operating system, thus providing run-time protection for the execution of security-critical code and data. However, Intel SGX is far from the acme of perfection. It has become a target of various attacks due to its security vulnerabilities. Researchers and practitioners have paid attention to the security vulnerabilities of SGX and investigated optimization solutions in real applications. Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap. Specifically, we propose two sets of criteria for estimating security risks of existing attacks and evaluating defense effects brought by attack countermeasures. Furthermore, we propose a taxonomy of SGX security vulnerabilities and shed light on corresponding attack vectors. After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria. At last, on the strength of our survey, we propose some open challenges and future directions in the research of SGX security.
引用
收藏
页数:36
相关论文
共 50 条
  • [41] A Survey on Voice Assistant Security: Attacks and Countermeasures
    Yan, Chen
    Ji, Xiaoyu
    Wang, Kai
    Jiang, Qinhong
    Jin, Zizhi
    Xu, Wenyuan
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (04)
  • [42] Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
    Hu, Yiwen
    Wang, Sihan
    Tu, Guan-Hua
    Xiao, Li
    Xie, Tian
    Lei, Xinyu
    Li, Chi-Yu
    [J]. PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 89 - 100
  • [43] A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
    Farhadi, Mozhdeh
    Lanet, Jean-Louis
    Pierre, Guillaume
    Miorandi, Daniele
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (06): : 973 - 997
  • [44] Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review
    Yaqoob, Tehreem
    Abbas, Haider
    Atiquzzaman, Mohammed
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3723 - 3768
  • [45] Security Vulnerabilities and Countermeasures for Target Localization in Bio-NanoThings Communication Networks
    Giaretta, Alberto
    Balasubramaniam, Sasitharan
    Conti, Mauro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 665 - 676
  • [46] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain
    Pourrahmani, Hossein
    Yavarinasab, Adel
    Monazzah, Amir Mahdi Hosseini
    Van Herle, Jan
    [J]. INTERNET OF THINGS, 2023, 23
  • [47] Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks
    Yang, Wei
    Wang, Qin
    Wan, Yadong
    He, Jie
    [J]. 2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 102 - 107
  • [48] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    [J]. IEEE ACCESS, 2021, 9 : 162401 - 162437
  • [49] A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures
    Ahmad, Hussain
    Dharmadasa, Isuru
    Ullah, Faheem
    Babar, Muhammad Ali
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (09)
  • [50] A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
    Saadi, Zena Mohammad
    Sadiq, Ahmed T.
    Akif, Omar Z.
    Farhan, Alaa K.
    [J]. ELECTRONICS, 2024, 13 (15)