ProximiTEE: Hardened SGX Attestation by Proximity Verification
OPEN ACCESS
Loading...
Author / Producer
Date
2020-03
Publication Type
Conference Paper
ETH Bibliography
yes
Citations
Altmetric
OPEN ACCESS
Data
Rights / License
Abstract
Intel SGX enables protected enclaves on untrusted computing platforms. An important part of SGX is its remote attestation mechanism that allows a remote verifier to check that the expected enclave was correctly initialized before provisioning secrets to it. However, SGX attestation is vulnerable to relay attacks where the attacker, using malicious software on the target platform, redirects the attestation and therefore the provisioning of confidential data to a platform that he physically controls. Although relay attacks have been known for a long time, their consequences have not been carefully examined. In this paper, we analyze relay attacks and show that redirection increases the adversary's abilities to compromise the enclave in several ways, enabling for instance physical and digital side-channel attacks that would not be otherwise possible.
We propose ProximiTEE, a novel solution to prevent relay attacks. Our solution is based on a trusted embedded device that is attached to the target platform. Our device verifies the proximity of the attested enclave, thus allowing attestation to the intended enclave regardless of malicious software, such as a compromised OS, on the target platform. The device also performs periodic proximity verification which enables secure enclave revocation by detaching the device. Although proximity verification has been proposed as a defense against relay attacks before, this paper is the first to experimentally demonstrate that it can be secure and reliable for TEEs like SGX. Additionally, we consider a stronger adversary that has obtained leaked SGX attestation keys and emulates an enclave on the target platform. To address such emulation attacks, we propose a second solution where the target platform is securely initialized by booting it from the attached embedded device.
Permanent link
Publication status
published
External links
Editor
Book title
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy
Journal / series
Volume
Pages / Article No.
5 - 16
Publisher
Association for Computing Machinery
Event
10th ACM Conference on Data and Application Security and Privacy (CODASPY '20)
Edition / version
Methods
Software
Geographic location
Date collected
Date created
Subject
Organisational unit
03755 - Capkun, Srdan / Capkun, Srdan
Notes
Due to the Coronavirus (COVID-19) the conference was conducted virtually.