Projekt per år
Sammanfattning
Intel Software Guard Extensions (SGX) provides a trusted execution environment (TEE) to run code and operate sensitive data.
SGX provides runtime hardware protection where both code and data are protected even if other code components are malicious.
However, recently many attacks targeting SGX have been identified and introduced that can thwart the hardware defence provided by SGX.
In this paper we present a survey of all attacks specifically targeting Intel SGX that are known to the authors, to date.
We categorized the attacks based on their implementation details into 7 different categories.
We also look into the available defence mechanisms against identified attacks and categorize the available types of mitigations for each presented attack.
SGX provides runtime hardware protection where both code and data are protected even if other code components are malicious.
However, recently many attacks targeting SGX have been identified and introduced that can thwart the hardware defence provided by SGX.
In this paper we present a survey of all attacks specifically targeting Intel SGX that are known to the authors, to date.
We categorized the attacks based on their implementation details into 7 different categories.
We also look into the available defence mechanisms against identified attacks and categorize the available types of mitigations for each presented attack.
Originalspråk | engelska |
---|---|
Antal sidor | 11 |
Status | Published - 2020 mars 25 |
Ämnesklassifikation (UKÄ)
- Datorsystem
Fingeravtryck
Utforska forskningsämnen för ”A Survey of Published Attacks on Intel SGX”. Tillsammans bildar de ett unikt fingeravtryck.Projekt
- 1 Aktiva
-
Side channels on software implementations of post-quantum cryptographic algorithms
Nilsson, A., Johansson, T. & Stankovski Wagner, P.
2017/09/01 → …
Projekt: Avhandling