ProximiTEE: Hardened SGX Attestation by Proximity Verification


Loading...

Date

2020-03

Publication Type

Conference Paper

ETH Bibliography

yes

Citations

Altmetric

Data

Abstract

Intel SGX enables protected enclaves on untrusted computing platforms. An important part of SGX is its remote attestation mechanism that allows a remote verifier to check that the expected enclave was correctly initialized before provisioning secrets to it. However, SGX attestation is vulnerable to relay attacks where the attacker, using malicious software on the target platform, redirects the attestation and therefore the provisioning of confidential data to a platform that he physically controls. Although relay attacks have been known for a long time, their consequences have not been carefully examined. In this paper, we analyze relay attacks and show that redirection increases the adversary's abilities to compromise the enclave in several ways, enabling for instance physical and digital side-channel attacks that would not be otherwise possible. We propose ProximiTEE, a novel solution to prevent relay attacks. Our solution is based on a trusted embedded device that is attached to the target platform. Our device verifies the proximity of the attested enclave, thus allowing attestation to the intended enclave regardless of malicious software, such as a compromised OS, on the target platform. The device also performs periodic proximity verification which enables secure enclave revocation by detaching the device. Although proximity verification has been proposed as a defense against relay attacks before, this paper is the first to experimentally demonstrate that it can be secure and reliable for TEEs like SGX. Additionally, we consider a stronger adversary that has obtained leaked SGX attestation keys and emulates an enclave on the target platform. To address such emulation attacks, we propose a second solution where the target platform is securely initialized by booting it from the attached embedded device.

Publication status

published

Editor

Book title

CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy

Journal / series

Volume

Pages / Article No.

5 - 16

Publisher

Association for Computing Machinery

Event

10th ACM Conference on Data and Application Security and Privacy (CODASPY '20)

Edition / version

Methods

Software

Geographic location

Date collected

Date created

Subject

Organisational unit

03755 - Capkun, Srdan / Capkun, Srdan check_circle

Notes

Due to the Coronavirus (COVID-19) the conference was conducted virtually.

Funding

Related publications and datasets