Plundervolt: Software-based Fault Injection Attacks against Intel SGX

被引:153
|
作者
Murdock, Kit [1 ]
Oswald, David [1 ]
Garcia, Flavio D. [1 ]
Van Bulck, Jo [3 ]
Gruss, Daniel [2 ]
Piessens, Frank [3 ]
机构
[1] Univ Birmingham, Birmingham, W Midlands, England
[2] Graz Univ Technol, Graz, Austria
[3] Katholieke Univ Leuven, Imec DistriNet, Leuven, Belgium
基金
英国工程与自然科学研究理事会; 比利时弗兰德研究基金会; 欧盟地平线“2020”;
关键词
D O I
10.1109/SP40000.2020.00057
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and power consumption in modern processors. Design restrictions ensure frequency and voltage are adjusted as a pair, based on the current load, because for each frequency there is only a certain voltage range where the processor can operate correctly. For this purpose, many processors (including the widespread Intel Core series) expose privileged software interfaces to dynamically regulate processor frequency and operating voltage. In this paper, we demonstrate that these privileged interfaces can be reliably exploited to undermine the system's security. We present the Plundervolt attack, in which a privileged software adversary abuses an undocumented Intel Core voltage scaling interface to corrupt the integrity of Intel SGX enclave computations. Plundervolt carefully controls the processor's supply voltage during an enclave computation, inducing predictable faults within the processor package. Consequently, even Intel SGX's memory encryption/authentication technology cannot protect against Plundervolt. In multiple case studies, we show how the induced faults in enclave computations can be leveraged in real-world attacks to recover keys from cryptographic algorithms (including the AES-NI instruction set extension) or to induce memory safety vulnerabilities into bug-free enclave code. We finally discuss why mitigating Plundervolt is not trivial, requiring trusted computing base recovery through microcode updates or hardware changes.
引用
收藏
页码:1466 / 1482
页数:17
相关论文
共 50 条
  • [1] VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface
    Chen, Zitai
    Vasilakis, Georgios
    Murdock, Kit
    Dean, Edward
    Oswald, David
    Garcia, Flavio D.
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 699 - 716
  • [2] Software-based fault injection tool (SOFIT)
    Boston Univ, Boston, United States
    [J]. Comput Syst Sci Eng, 6 (327-337):
  • [3] A software-based fault injection tool (SOFIT)
    Avresky, DR
    Geoghegan, SJ
    Tapadiya, PK
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 1998, 13 (06): : 327 - 337
  • [4] FaultLine: Software-based Fault Injection on Memory Transfers
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2021, : 46 - 55
  • [5] LDSFI: a Lightweight Dynamic Software-based Fault Injection
    Ahmad, Hussein Al-haj
    Sedaghat, Yasser
    Moradiyan, Mahin
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2019), 2019, : 207 - 213
  • [6] Software-based microarchitectural attacks
    Gruss, Daniel
    [J]. IT-INFORMATION TECHNOLOGY, 2018, 60 (5-6): : 335 - 341
  • [7] VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX
    Qiu, Pengfei
    Wang, Dongsheng
    Lyu, Yongqiang
    Tian, Ruidong
    Wang, Chunlu
    Qu, Gang
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1130 - 1143
  • [8] FERRARI - A FLEXIBLE SOFTWARE-BASED FAULT AND ERROR INJECTION SYSTEM
    KANAWATI, GA
    KANAWATI, NA
    ABRAHAM, JA
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1995, 44 (02) : 248 - 260
  • [9] Fast software-based attacks on SecurID
    Contini, S
    Yin, YQL
    [J]. FAST SOFTWARE ENCRYPTION, 2004, 3017 : 454 - 471
  • [10] QEMU-Based Fault Injection for a System-Level Analysis of Software Countermeasures Against Fault Attacks
    Hoeller, Andrea
    Krieg, Armin
    Rauter, Tobias
    Iber, Johannes
    Kreiner, Christian
    [J]. 2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2015, : 530 - 533