Proceedings of the 10th European Workshop on Systems Security 2017
DOI: 10.1145/3065913.3065915
|View full text |Cite
|
Sign up to set email alerts
|

Cache Attacks on Intel SGX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
229
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 300 publications
(238 citation statements)
references
References 6 publications
0
229
1
Order By: Relevance
“…Another family supports broader range of tasks (such as custom computation tasks) [9] [10] [39] [40], but relies on Trusted Execution Environments (TEEs) and Remote Attestation Protocols [41] [42] to verify that the computations are being run on a genuine platform and the results are correct. However, TEEs are not available on every platform, require users to trust hardware vendors and are susceptible to side channel attacks [43] [44]. In contrast, PoP does not make any assumptions on users hardware.…”
Section: Related Workmentioning
confidence: 99%
“…Another family supports broader range of tasks (such as custom computation tasks) [9] [10] [39] [40], but relies on Trusted Execution Environments (TEEs) and Remote Attestation Protocols [41] [42] to verify that the computations are being run on a genuine platform and the results are correct. However, TEEs are not available on every platform, require users to trust hardware vendors and are susceptible to side channel attacks [43] [44]. In contrast, PoP does not make any assumptions on users hardware.…”
Section: Related Workmentioning
confidence: 99%
“…Various attacks on SGX have been made public. While some analyze the memory access pattern of the enclave to extract secrets [38], [39], others are able to reconstruct secrets via a caching side-channel [8], [15], [37].…”
Section: Implementation Considerationsmentioning
confidence: 99%
“…In more recent work, Rong et al [18] presented an improved methodology to establish covert channels in systems with shared cache, called Cloud Covert Channel based on Memory Deduplication (CCCMD). These cache side and covert channels have been refined [11,16] or targeted to compromise special hardware like the Intel SGX [5]. Other security issues due to architectural characteristics have been shown by Evtyushkin et al [3].…”
Section: Related Workmentioning
confidence: 99%