♫musicjinni

USENIX Security '21-VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves

video thumbnail
USENIX Security '21 - VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface

Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, and Flavio D. Garcia, School of Computer Science, University of Birmingham, UK

Hardware-based fault injection attacks such as voltage and clock glitching have been thoroughly studied on embedded devices. Typical targets for such attacks include smartcards and low-power microcontrollers used in IoT devices. This paper presents the first hardware-based voltage glitching attack against a fully-fledged Intel CPU. The transition to complex CPUs is not trivial due to several factors, including: a complex operating system, large power consumption, multi-threading, and high clock speeds. To this end, we have built VoltPillager, a low-cost tool for injecting messages on the Serial Voltage Identification bus between the CPU and the voltage regulator on the motherboard. This allows us to precisely control the CPU core voltage. We leverage this powerful tool to mount fault-injection attacks that breach confidentiality and integrity of Intel SGX enclaves. We present proof-of-concept key-recovery attacks against cryptographic algorithms running inside SGX. We demonstrate that VoltPillager attacks are more powerful than recent software-only undervolting attacks against SGX (CVE-2019-11157) because they work on fully patched systems with all countermeasures against software undervolting enabled. Additionally, we are able to fault security-critical operations by delaying memory writes. Mitigation of VoltPillager is not straightforward and may require a rethink of the SGX adversarial model where a cloud provider is untrusted and has physical access to the hardware.

View the full USENIX Security '21 Program at https://www.usenix.org/conference/usenixsecurity21/technical-sessions

USENIX ATC '19 - Zanzibar: Google’s Consistent, Global Authorization System

USENIX ATC '22/OSDI '22 Joint Keynote Address - Surprise-Inspired Networking

USENIX ATC '20 - OpenExpress: Fully Hardware Automated Open Research Framework for Future Fast...

USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers

USENIX ATC '22 - Direct Access, High-Performance Memory Disaggregation with DirectCXL

USENIX Security '18 - Rethinking Access Control and Authentication for the Home Internet of Things

Why Attend USENIX Conferences?

USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?

USENIX ATC '23 - Portunus: Re-imagining Access Control in Distributed Systems

USENIX Security '21 - Automatic Policy Generation for Inter-Service Access Control of Microservices

USENIX ATC '19 - SemperOS: A Distributed Capability System

USENIX ATC '13 - Opening Remarks

USENIX Security '22 - Open to a fault: On the passive compromise of TLS keys via transient errors

USENIX ATC '22/OSDI '22 Joint Keynote Address - The Computing and Information Science...

USENIX ATC '19 - Multi-Queue Fair Queuing

USENIX Security '22 - Private Signaling

USENIX Security '22 - How and Why People Use Virtual Private Networks

USENIX Enigma 2022 - The Global Privacy Control: Exercising Legal Rights at Scale

USENIX ATC '22/OSDI '22 Joint Keynote Address - Trustworthy Open Source: The Consequences of Success

USENIX Enigma 2023 - Adventures in Authentication and Authorization

USENIX Security '22 - Practical Data Access Minimization in Trigger-Action Platforms

USENIX Security '21 - PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal...

USENIX Security '22 - OpenVPN is Open to VPN Fingerprinting

USENIX ATC '13 - I/O Stack Optimization for Smartphones

USENIX Security '20 - Detecting Stuffing of a User’s Credentials at Her Own Accounts

USENIX Security '22 - Building an Open, Robust, and Stable Voting-Based Domain Top List

USENIX Enigma 2023 - Technology Abuse Clinics for Survivors of Intimate Partner Violence

USENIX ATC '19 - E3: Energy-Efficient Microservices on SmartNIC-Accelerated Servers

USENIX ATC '22 - High Throughput Replication with Integrated Membership Management

USENIX Security '22 - IHOP: Improved Statistical Query Recovery against Searchable Symmetric

Disclaimer DMCA