TEEREX: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves

被引:0
|
作者
Cloosters, Tobias [1 ]
Rodler, Michael [1 ]
Davi, Lucas [1 ]
机构
[1] Univ Duisburg Essen, Duisburg, Germany
来源
PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM | 2020年
关键词
SYMBOLIC EXECUTION; ATTACKS; API;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intel's Software Guard Extensions (SGX) introduced new instructions to switch the processor to enclave mode which protects it from introspection. While the enclave mode strongly protects the memory and the state of the processor, it cannot withstand memory corruption errors inside the enclave code. In this paper, we show that the attack surface of SGX enclaves provides new challenges for enclave developers as exploitable memory corruption vulnerabilities are easily introduced into enclave code. We develop TEEREx to automatically analyze enclave binary code for vulnerabilities introduced at the host-to-enclave boundary by means of symbolic execution. Our evaluation on public enclave binaries reveal that many of them suffer from memory corruption errors allowing an attacker to corrupt function pointers or perform arbitrary memory writes. As we will show, TEEREx features a specifically tailored framework for SGX enclaves that allows simple proof-of-concept exploit construction to assess the discovered vulnerabilities. Our findings reveal vulnerabilities in multiple enclaves, including enclaves developed by Intel, Baidu, and Wo1fSSL, as well as biometric fingerprint software deployed on popular laptop brands.
引用
收藏
页码:841 / 858
页数:18
相关论文
共 15 条
  • [1] Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices
    Salehi, Majid
    Degani, Luca
    Roveri, Marco
    Hughes, Danny
    Crispo, Bruno
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1124 - 1138
  • [2] Detecting Concurrency Memory Corruption Vulnerabilities
    Cai, Yan
    Zhu, Biyun
    Meng, Ruijie
    Yun, Hao
    He, Liang
    Su, Purui
    Liang, Bin
    ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 706 - 717
  • [3] MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities
    Sezer, Emre C.
    Ning, Peng
    Kil, Chongkyung
    Xu, Jun
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 562 - +
  • [4] Memory Corruption Vulnerabilities Detection for Android Binary Software
    Zhang, Bin
    Wu, Bo
    Feng, Chao
    Tang, Chaojing
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 16 - 20
  • [5] Research on Discovering Memory Corruption Vulnerabilities for Embedded CGIs
    Wang D.
    Zhang X.-S.
    Chen T.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2020, 49 (05): : 745 - 750
  • [6] When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs
    Llorente-Vazquez, Oscar
    Santos-Grueiro, Igor
    Bringas, Pablo Garcia
    IEEE ACCESS, 2023, 11 : 44725 - 44740
  • [7] SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis
    Yu, Donghui
    Wang, Jianqiang
    Fang, Haoran
    Fang, Ya
    Zhang, Yuanyuan
    PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 485 - 498
  • [8] Towards Heap-Based Memory Corruption Discovery
    Wang, Wenzhi
    Fan, Meng
    Yu, Aimin
    Meng, Dan
    2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 502 - 511
  • [9] Applications of Computational Intelligence for Static Software Checking Against Memory Corruption Vulnerabilities
    Alvares, Marcos
    Marwala, Tshilidzi
    de Lima Neto, Fernando Buarque
    2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY (CICS), 2013, : 59 - 66
  • [10] A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C plus plus Programs
    Gao, Yuhan
    Chen, Liwei
    Shi, Gang
    Zhang, Fei
    2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 354 - 360