Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments

نویسندگان

چکیده

This article analyzes a previously overlooked attack surface that allows unprivileged adversaries to impact floating-point computations in enclaves through the Application Binary Interface (ABI). In comprehensive study across 7 industry-standard and research enclave shielding runtimes for Intel Software Guard Extensions (SGX), we show control state registers of x87 Floating-Point Unit (FPU) Streaming SIMD are not always properly sanitized on entry. We furthermore this goes beyond x86 architecture can also affect RISC-V enclaves. Focusing SGX, abuse adversary’s over precision rounding modes as an ABI fault injection primitive corrupt enclaved operations. Our analysis reveals is especially relevant applications use older FPU, which still under certain conditions used by modern compilers. exemplify potential quality-degradation attacks machine learning SPEC benchmarks. then explore confidentiality, showing exception masks be abused controlled channel recover multiplication operands. findings, affecting 5 studied SGX one runtime, demonstrate challenges implementing high-assurance trusted execution computing architectures.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Attestation from Trusted Execution Environments

Credential platforms implemented on top of Trusted Execution Environments (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwords, securely. One important requirement for a TrEE-based credential platform is the ability to attest that a credential has been created and is kept within the TrEE. Credential properties, such as usage permissions, should be a...

متن کامل

Teechan: Payment Channels Using Trusted Execution Environments

Blockchain protocols are inherently limited in transaction throughput and latency. Recent efforts to address performance and scale blockchains have focused on off-chain payment channels. While such channels can achieve low latency and high throughput, deploying them securely on top of the Bitcoin blockchain has been difficult, partly because building a secure implementation requires changes to ...

متن کامل

On Making Emerging Trusted Execution Environments Accessible to Developers

New types of Trusted Execution Environment (TEE) architectures like TrustLite and Intel Software Guard Extensions (SGX) are emerging. They bring new features that can lead to innovative security and privacy solutions. But each new TEE environment comes with its own set of interfaces and programming paradigms, thus raising the barrier for entry for developers who want to make use of these TEEs. ...

متن کامل

Protecting Web Passwords from Rogue Servers using Trusted Execution Environments

Passwords are undoubtedly the most dominant user authentication mechanism on the web today. Although they are inexpensive and easy-to-use, security concerns of passwordbased authentication are serious. Phishing and theft of password databases are two critical concerns. The tendency of users to reuse passwords across different services exacerbates the impact of these two concerns. Current soluti...

متن کامل

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments

In the past decade, we have come to rely on computers for various safety and security-critical tasks, such as securing our homes, operating our vehicles, and controlling our finances. To facilitate these tasks, chip manufacturers have begun including trusted execution environments (TEEs) in their processors, which enable critical code (e.g., cryptographic functions) to run in an isolated hardwa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital threats

سال: 2022

ISSN: ['2692-1626', '2576-5337']

DOI: https://doi.org/10.1145/3491264