We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

SGX Enclave Exploit Analysis and Considerations for Defensive SGX Programming

Formal Metadata

Title
SGX Enclave Exploit Analysis and Considerations for Defensive SGX Programming
Title of Series
Number of Parts
287
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Intel SGX provided a mechanism to better isolate user-level software from attackers. However, attackers will still use various methods to attack SGX and user’s Enclaves. And user’s code inside Enclave may also have bugs, which can be leveraged by the attackers. We are from intel SGX SDK team, we have conducted security analysis and pen-test for SGX Enclave (based on SGX SDK) during the past 10+ years. We want to summarize some past exploits we encountered in our daily work and what's the mitigation, hope it can help the Enclave developers to write more secure Enclave code. Target topics category: TEE-specific attacks and defenses (vulnerabilities, exploits, defensive programming) Purpose: Explain the Security Properties of Intel® SGX Technology. Help Enclave Developers write more secure code within an enclave. Analyze a sampling of enclave defense-in-depth strategies and protections against known attacks. SGX Enclave Security and Challenge: Code running within the enclave must be written securely. Poorly written code may be subject to attack by various methods. Developers must also be aware of potential side-channel attacks on code.