Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy 2017
DOI: 10.1145/3029806.3029836
|View full text |Cite
|
Sign up to set email alerts
|

Fault Attacks on Encrypted General Purpose Compute Platforms

Abstract: Adversaries with physical access to a target platform can perform cold boot or DMA attacks to extract sensitive data from the RAM. In response, several main-memory encryption schemes have been proposed to prevent such attacks. Also hardware vendors have acknowledged the threat and already announced respective hardware extensions. Intel's SGX and AMD's SME will provide means to encrypt parts of the RAM to protect security-relevant assets that reside there.Encrypting the RAM will protect the user's content again… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…Additionally, in contrast to our prototype, both [9] and [5] did not realize the attack on real hardware, as only the AMD specifications for SEV and SME were public. The results of our work strongly indicate that [9] also works on real SEV platforms.…”
Section: Related Workmentioning
confidence: 92%
See 1 more Smart Citation
“…Additionally, in contrast to our prototype, both [9] and [5] did not realize the attack on real hardware, as only the AMD specifications for SEV and SME were public. The results of our work strongly indicate that [9] also works on real SEV platforms.…”
Section: Related Workmentioning
confidence: 92%
“…Buhren et al [5] leveraged fault attacks on Secure Memory Encryption (SME) platforms, which SEV is built upon. They showed that it is possible to extract the private RSA key of a GnuPG user from encrypted memory.…”
Section: Related Workmentioning
confidence: 99%
“…Using a modified firmware, they are able to extract the private key, used by the SP to authenticate itself as an AMD device. Data Faults In [11], Buhren et al explore the idea of performing classical fault attacks on application data in memory. They flip a bit in a ciphertext block, in order to create garbled plaintext.…”
Section: E Previous Attacks On Sevmentioning
confidence: 99%
“…With an encryption oracle, the adversary could breach the integrity of the victim VM and force the victim VM to (1) execute arbitrary instruction, or (2) alter sensitive data, or (3) change control flows. Note that our encryption oracle differs from those in the prior works [8], [6], [17] as it does not rely on SEV's memory integrity flaws.…”
Section: B Variant 2: Executing Victim Vm's Encrypted Instructionsmentioning
confidence: 99%