Designing a Provenance Analysis for SGX Enclaves

6Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

SGX enclaves are trusted user-space memory regions that ensure isolation from the host, which is considered malicious. However, enclaves may suffer from vulnerabilities that allow adversaries to compromise their trustworthiness. Consequently, the SGX isolation may hinder defenders from recognizing an intrusion. Ideally, to identify compromised enclaves, the owner should have privileged access to the enclave memory and a policy to recognize the attack. Most importantly, these operations should not break the SGX properties. In this work, we propose SgxMonitor, a novel provenance analysis to monitor and identify compromised enclaves. SgxMonitor is composed of two elements: (i) a technique to extract contextual runtime information from an enclave, and (ii) a novel model to recognize enclaves' intrusions. Our evaluation shows that SgxMonitor successfully identifies enclave intrusions against state-of-the-art attacks without undermining the SGX isolation. Our experiments did not report false positives and negatives during normal enclave executions, while incurring a marginal overhead that does not affect real use cases deployment, thus supporting the use of SgxMonitor in realistic scenarios.

Author supplied keywords

Cite

CITATION STYLE

APA

Toffalini, F., Payer, M., Zhou, J., & Cavallaro, L. (2022). Designing a Provenance Analysis for SGX Enclaves. In ACM International Conference Proceeding Series (pp. 102–116). Association for Computing Machinery. https://doi.org/10.1145/3564625.3567994

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free