We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

SGX Enclave Exploit Analysis and Considerations for Defensive SGX Programming

Formale Metadaten

Titel
SGX Enclave Exploit Analysis and Considerations for Defensive SGX Programming
Serientitel
Anzahl der Teile
287
Autor
Lizenz
CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
Intel SGX provided a mechanism to better isolate user-level software from attackers. However, attackers will still use various methods to attack SGX and user’s Enclaves. And user’s code inside Enclave may also have bugs, which can be leveraged by the attackers. We are from intel SGX SDK team, we have conducted security analysis and pen-test for SGX Enclave (based on SGX SDK) during the past 10+ years. We want to summarize some past exploits we encountered in our daily work and what's the mitigation, hope it can help the Enclave developers to write more secure Enclave code. Target topics category: TEE-specific attacks and defenses (vulnerabilities, exploits, defensive programming) Purpose: Explain the Security Properties of Intel® SGX Technology. Help Enclave Developers write more secure code within an enclave. Analyze a sampling of enclave defense-in-depth strategies and protections against known attacks. SGX Enclave Security and Challenge: Code running within the enclave must be written securely. Poorly written code may be subject to attack by various methods. Developers must also be aware of potential side-channel attacks on code.