Projects per year
Abstract
Intel Software Guard Extensions (SGX) provides a trusted execution environment (TEE) to run code and operate sensitive data.
SGX provides runtime hardware protection where both code and data are protected even if other code components are malicious.
However, recently many attacks targeting SGX have been identified and introduced that can thwart the hardware defence provided by SGX.
In this paper we present a survey of all attacks specifically targeting Intel SGX that are known to the authors, to date.
We categorized the attacks based on their implementation details into 7 different categories.
We also look into the available defence mechanisms against identified attacks and categorize the available types of mitigations for each presented attack.
SGX provides runtime hardware protection where both code and data are protected even if other code components are malicious.
However, recently many attacks targeting SGX have been identified and introduced that can thwart the hardware defence provided by SGX.
In this paper we present a survey of all attacks specifically targeting Intel SGX that are known to the authors, to date.
We categorized the attacks based on their implementation details into 7 different categories.
We also look into the available defence mechanisms against identified attacks and categorize the available types of mitigations for each presented attack.
Original language | English |
---|---|
Number of pages | 11 |
Publication status | Published - 2020 Mar 25 |
Subject classification (UKÄ)
- Computer Systems
Fingerprint
Dive into the research topics of 'A Survey of Published Attacks on Intel SGX'. Together they form a unique fingerprint.Projects
- 1 Finished
-
Side channels on software implementations of post-quantum cryptographic algorithms
Nilsson, A. (Researcher), Johansson, T. (Supervisor) & Stankovski Wagner, P. (Assistant supervisor)
2017/09/01 → 2023/12/31
Project: Dissertation