作者
Nico Weichbrodt, Anil Kurmus, Peter Pietzuch, Rüdiger Kapitza
发表日期
2016
研讨会论文
Computer Security–ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I 21
页码范围
440-457
出版商
Springer International Publishing
简介
Intel’s Software Guard Extensions (SGX) provide a new hardware-based trusted execution environment on Intel CPUs using secure enclaves that are resilient to accesses by privileged code and physical attackers. Originally designed for securing small services, SGX bears promise to protect complex, possibly cloud-hosted, legacy applications. In this paper, we show that previously considered harmless synchronisation bugs can turn into severe security vulnerabilities when using SGX. By exploiting use-after-free and time-of-check-to-time-of-use (TOCTTOU) bugs in enclave code, an attacker can hijack its control flow or bypass access control.
We present AsyncShock, a tool for exploiting synchronisation bugs of multithreaded code running under SGX. AsyncShock achieves this by only manipulating the scheduling of threads that are used to execute enclave code. It allows an attacker to interrupt …
引用总数
2016201720182019202020212022202320241383743424329245
学术搜索中的文章
N Weichbrodt, A Kurmus, P Pietzuch, R Kapitza - Computer Security–ESORICS 2016: 21st European …, 2016