A Survey of Published Attacks on Intel SGX
(2020)- Abstract
- Intel Software Guard Extensions (SGX) provides a trusted execution environment (TEE) to run code and operate sensitive data.
SGX provides runtime hardware protection where both code and data are protected even if other code components are malicious.
However, recently many attacks targeting SGX have been identified and introduced that can thwart the hardware defence provided by SGX.
In this paper we present a survey of all attacks specifically targeting Intel SGX that are known to the authors, to date.
We categorized the attacks based on their implementation details into 7 different categories.
We also look into the available defence mechanisms against identified attacks and categorize the... (More) - Intel Software Guard Extensions (SGX) provides a trusted execution environment (TEE) to run code and operate sensitive data.
SGX provides runtime hardware protection where both code and data are protected even if other code components are malicious.
However, recently many attacks targeting SGX have been identified and introduced that can thwart the hardware defence provided by SGX.
In this paper we present a survey of all attacks specifically targeting Intel SGX that are known to the authors, to date.
We categorized the attacks based on their implementation details into 7 different categories.
We also look into the available defence mechanisms against identified attacks and categorize the available types of mitigations for each presented attack. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/a6d6575f-ac4f-466f-8582-48e1fe48b50c
- author
- Nilsson, Alexander
LU
; Nikbakht Bideh, Pegah LU
and Brorsson, Joakim LU
- organization
- publishing date
- 2020-03-25
- type
- Book/Report
- publication status
- published
- subject
- pages
- 11 pages
- project
- Side channels on software implementations of post-quantum cryptographic algorithms
- language
- English
- LU publication?
- yes
- id
- a6d6575f-ac4f-466f-8582-48e1fe48b50c
- alternative location
- https://arxiv.org/abs/2006.13598
- date added to LUP
- 2020-03-25 15:52:42
- date last changed
- 2025-04-10 09:27:21
@techreport{a6d6575f-ac4f-466f-8582-48e1fe48b50c, abstract = {{Intel Software Guard Extensions (SGX) provides a trusted execution environment (TEE) to run code and operate sensitive data.<br/><br/>SGX provides runtime hardware protection where both code and data are protected even if other code components are malicious.<br/><br/>However, recently many attacks targeting SGX have been identified and introduced that can thwart the hardware defence provided by SGX.<br/><br/>In this paper we present a survey of all attacks specifically targeting Intel SGX that are known to the authors, to date.<br/><br/>We categorized the attacks based on their implementation details into 7 different categories.<br/><br/>We also look into the available defence mechanisms against identified attacks and categorize the available types of mitigations for each presented attack.}}, author = {{Nilsson, Alexander and Nikbakht Bideh, Pegah and Brorsson, Joakim}}, language = {{eng}}, month = {{03}}, title = {{A Survey of Published Attacks on Intel SGX}}, url = {{https://lup.lub.lu.se/search/files/81011058/main.pdf}}, year = {{2020}}, }