Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3484821
|View full text |Cite
|
Sign up to set email alerts
|

SmashEx: Smashing SGX Enclaves Using Exceptions

Abstract: Exceptions are a commodity hardware functionality which is central to multi-tasking OSes as well as event-driven user applications. Normally, the OS assists the user application by lifting the semantics of exceptions received from hardware to program-friendly user signals and exception handling interfaces. However, can exception handlers work securely in user enclaves, such as those enabled by Intel SGX, where the OS is not trusted by the enclave code?In this paper, we introduce a new attack called SmashEx whi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…In [23], the authors injected the ROP payload using the re-entry vulnerability of AEX. When an exception occurs in the enclave, the SGX enabled processor exits the enclave by using Asynchronous Enclave Exit (AEX).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [23], the authors injected the ROP payload using the re-entry vulnerability of AEX. When an exception occurs in the enclave, the SGX enabled processor exits the enclave by using Asynchronous Enclave Exit (AEX).…”
Section: Discussionmentioning
confidence: 99%
“…Refs. [14,[20][21][22][23] took the control flow of the process within enclaves by using the ROP. However, the methods proposed in previous studies require detailed analysis of the enclave software because it is essential to know how the software processes the protected data.…”
Section: Introductionmentioning
confidence: 99%
“…SGX has been widely used in many applications [10,15,66,[73][74][75]. Recent works have intensively studied side-channel vulnerabilities in SGX [2,8,12,14,16,34,43,49,53,58,72,77,79], while memory attacks have also received increasing attention [11,46,65,71]. ASLRbased memory protection methods also appeared for SGX [54,64,80].…”
Section: Related Workmentioning
confidence: 99%
“…The safety of trust-bft protocols is based on the assumption that trusted components cannot be compromised. However, recent works have illustrated several attacks on trusted components, such as SmashEx [15], time synchronization bugs [56], and so on [5,8].…”
Section: Excessive Trust For Safetymentioning
confidence: 99%