Leveraging Intel SGX to Create a Nondisclosure Cryptographic library
نویسندگان
چکیده
Enforcing integrity and confidentiality of users’ application code and data is a challenging mission that any software developer working on an online production grade service is facing. Since cryptology is not a widely understood subject, people on the cutting edge of research and industry are always seeking for new technologies to naturally expand the security of their programs and systems. Intel Software Guard Extension (Intel SGX) is an Intel technology for developers who are looking to protect their software binaries from plausible attacks using hardware instructions. The Intel SGX puts sensitive code and data into CPU-hardened protected regions called enclaves. In this project we leverage the Intel SGX to produce a secure cryptographic library which keeps the generated keys inside an enclave restricting use and dissemination of confidential cryptographic keys. Using enclaves to store the keys we maintain a small Trusted Computing Base (TCB) where we also perform computation on temporary buffers to and from untrusted application code. As a proof of concept, we implemented hashes and symmetric encryption algorithms inside the enclave where we stored hashes, Initialization Vectors (IVs) and random keys and open sourced the code (https://github.com/hmofrad/CryptoEnclave).
منابع مشابه
Annotated Bibliography on Leveraging Intel SGX to Create a Nondisclosure Cryptographic library
There are three articles from three different Intel’s research groups dated back to 2013 that introduce the Intel SGX extension for the first time in a workshop on hardware and architectural support for security and privacy (HASP). The first paper is written by Frank McKeen. In this paper, F. McKeen et al. introduced the concept of an enclave within an application’s virtual address space and sh...
متن کاملIntel SGX Remote Attestation is not sufficient
Intel SGX enclaves provide hardware enforced confidentiality and integrity guarantees for running pure computations (i.e., OS-level side-effect-free code) in the cloud environment. In addition, SGX remote attestation enables enclaves to prove that a claimed enclave is indeed running inside a genuine SGX hardware and not some (adversary controlled) SGX simulator. Since cryptographic protocols do...
متن کاملTrusted Code Execution on Untrusted Platforms Using Intel Sgx
Today, isolated trusted computation and code execution is of paramount importance to protect sensitive information and workfl ows from other malicious privileged or unprivileged software. Intel Software Guard Extensions (SGX) is a set of security architecture extensions fi rst introduced in the Skylake microarchitecture that enables a Trusted Execution Environment (TEE). It provides an ‘inverse...
متن کاملSnort Intrusion Detection System with Intel Software Guard Extension (Intel SGX)
Network Function Virtualization (NFV) promises the benefits of reduced infrastructure, personnel, and management costs by outsourcing network middleboxes to the public or private cloud. Unfortunately, running network functions in the cloud entails security challenges, especially for complex stateful services. In this paper, we describe our experiences with hardening the king of middleboxes - In...
متن کاملMemJam: A False Dependency Attack against Constant-Time Crypto Implementations
Cache attacks exploit memory access patterns of cryptographic implementations. Constant-Time implementation techniques have become an indispensable tool in fighting cache timing attacks. These techniques engineer the memory accesses of cryptographic operations to follow a uniform key independent pattern. However, the constant-time behavior is dependent on the underlying architecture, which can ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1705.04706 شماره
صفحات -
تاریخ انتشار 2016