Survey of Attacks and Defenses against SGX

被引:0
|
作者
Zhang, Yahui [1 ]
Zhao, Min [2 ]
Li, Tingquan [1 ]
Han, Huan [1 ]
机构
[1] Army Engn Univ PLA, Chongqing, Peoples R China
[2] Army Engn Univ PLA, Nanjing, Peoples R China
关键词
SGX; Threat model; Trusted computing base; Attack vectors; Countermeasures;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The great abundance of information brings us convenient life. At the same time, how to prevent malicious attackers from stealing user data or privacy is a hot and difficult issue in the current research of information security. In 2013, Intel proposed a new processor security technology SGX(Software Guard Extensions) at the HASP conference, which can provide a trusted zone named enclave on the computing platform to protect the confidentiality and integrity of user code and data. SGX is a breakthrough research achievement in the field of information security, which is of great significance to individual users and tenants of cloud computing platforms. In order to better study the attacks and defense technologies against SGX, the threat model against SGX attacks is introduced, the types of attacks against SGX are summarized, the defense measures against SGX attacks are analyzed, and the possible future attacks against SGX and the Defense technology was explored.
引用
收藏
页码:1492 / 1496
页数:5
相关论文
共 50 条
  • [1] Adversarial Attacks and Defenses Against Deep Neural Networks: A Survey
    Ozdag, Mesut
    [J]. CYBER PHYSICAL SYSTEMS AND DEEP LEARNING, 2018, 140 : 152 - 161
  • [2] The Survey of RFID Attacks and Defenses
    Li, Hong
    Chen, YongHui
    He, ZhangQing
    [J]. 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [3] Defenses to Membership Inference Attacks: A Survey
    Hu, Li
    Yan, Anli
    Yan, Hongyang
    Li, Jin
    Huang, Teng
    Zhang, Yingying
    Dong, Changyu
    Yang, Chunsheng
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [4] Holistic Defenses Against Microarchitectural Attacks
    Kasikci, Baris
    Loughlin, Kevin
    [J]. DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES V, 2021, 11751
  • [5] SGXPecial: Specializing SGX Interfaces against Code Reuse Attacks
    Mishra, Shachee
    Polychronakis, Michalis
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2021), 2021, : 48 - 54
  • [6] Attacks and defenses in user authentication systems: A survey
    Wang, Xuerui
    Yan, Zheng
    Zhang, Rui
    Zhang, Peng
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 188
  • [7] Privacy Attacks and Defenses in Machine Learning: A Survey
    Liu, Wei
    Han, Xun
    He, Meiling
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 413 - 422
  • [8] Survey on adversarial attacks and defenses for object detection
    Wang, Xinxin
    Chen, Jing
    He, Kun
    Zhang, Zijun
    Du, Ruiying
    Li, Qiao
    She, Jisi
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (11): : 260 - 277
  • [9] Survey on Privacy Attacks and Defenses in Machine Learning
    Liu, Rui-Xuan
    Chen, Hong
    Guo, Ruo-Yang
    Zhao, Dan
    Liang, Wen-Juan
    Li, Cui-Ping
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (03): : 866 - 892
  • [10] A Detailed Survey on Federated Learning Attacks and Defenses
    Sikandar, Hira Shahzadi
    Waheed, Huda
    Tahir, Sibgha
    Malik, Saif U. R.
    Rafique, Waqas
    [J]. ELECTRONICS, 2023, 12 (02)