Preventing Page Faults from Telling Your Secrets
@article{Shinde2016PreventingPF, title={Preventing Page Faults from Telling Your Secrets}, author={Shweta Shinde and Zheng Leong Chua and V. Narayanan and P. Saxena}, journal={Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security}, year={2016} }
New hardware primitives such as Intel SGX secure a user-level process in presence of an untrusted or compromised OS. Such "enclaved execution" systems are vulnerable to several side-channels, one of which is the page fault channel. In this paper, we show that the page fault side-channel has sufficient channel capacity to extract bits of encryption keys from commodity implementations of cryptographic routines in OpenSSL and Libgcrypt -- leaking 27% on average and up to 100% of the secret bits in… CONTINUE READING
Figures, Tables, and Topics from this paper
143 Citations
A compiler and verifier for page access oblivious computation
- Computer Science
- ESEC/SIGSOFT FSE
- 2017
- 20
- Highly Influenced
- PDF
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks
- Computer Science
- ASPLOS
- 2020
- 1
- Highly Influenced
- PDF
Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution
- Computer Science
- USENIX Security Symposium
- 2017
- 133
- Highly Influenced
- PDF
Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks
- Computer Science
- USENIX Annual Technical Conference
- 2018
- 76
- PDF
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults
- Computer Science
- RAID
- 2017
- 28
- PDF
References
SHOWING 1-6 OF 6 REFERENCES
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
- Computer Science
- 2015 IEEE Symposium on Security and Privacy
- 2015
- 508
- Highly Influential
- PDF
Memory Trace Oblivious Program Execution
- Computer Science
- 2013 IEEE 26th Computer Security Foundations Symposium
- 2013
- 54
- Highly Influential
- PDF
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
- Computer Science
- ASPLOS
- 2008
- 419
- Highly Influential
- PDF
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2014
- 141
- Highly Influential
- PDF
Innovative instructions and software model for isolated execution
- Computer Science
- HASP '13
- 2013
- 771
- Highly Influential
- PDF
InkTag: secure applications on an untrusted operating system
- Computer Science, Medicine
- ASPLOS '13
- 2013
- 205
- Highly Influential
- PDF