PhD Proposal by Ming-Wei Shih

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Thursday September 20, 2018 - Friday September 21, 2018
      2:00 pm - 3:59 pm
  • Location: KACB 3126
  • Phone:
  • URL:
  • Email:
  • Fee(s):
    N/A
  • Extras:
Contact
No contact information submitted.
Summaries

Summary Sentence: Securing Intel SGX against Side-channel Attacks via Load-time Synthesis

Full Summary: No summary paragraph submitted.

Ph.D. Thesis Proposal Announcement

 

Title: Securing Intel SGX against Side-channel Attacks via Load-time Synthesis

 

Ming-Wei Shih

Ph.D. Student

Information Security

School of Computer Science

Georgia Institute of Technology

 

Date: Sept 20 (Thursday)

Start Time: 2:00pm

Location: KACB 3126

 

Committee

———————

Dr. Taesoo Kim (Advisor, School of Computer Science, Georgia Institute of Technology)

Dr. Wenke Lee(School of Computer Science, Georgia Institute of Technology)

Dr. Marcus Pienado (Microsoft Research)

 

Abstract

———————

 

One real-world technique that has the potential to ensure

the security of remote execution in an untrusted end-point is

Intel Software Guard Extensions (SGX). SGX allows an application

to run in a hardware-assisted isolated execution environment,

or an enclave, that excludes even privileged software such as

an operating system. Unfortunately, recent studies have shown

that such isolation is vulnerable to various types of side-channel

attacks. Given the strong threat model (i.e., an attacker controls

privileged software), the side-channel attacks are uniquely powerful.

More specifically, the attacker can learn accurate, high-resolution

side-channel information of the protected application, which

undermines the security guarantees that SGX intends to provide.

 

Although researchers have proposed several countermeasures

against the side-channel attacks on SGX, these countermeasures

focus only on a limited number of side-channel types. To achieve a

complete defense, one idea is to statically compose multiple countermeasures

and to enforce them on an application before deploying it to the end-point.

However, some of the countermeasures may not work as expected because

the statically enforced countermeasures cannot be adaptive to the hardware

specification at the end-point. For example, a TSX-based countermeasure

may provide no protection if the end-point does not support Intel TSX.

To address the limitation of static composition, we propose an alternative

approach, load-time synthesis, which adaptively composes multiple

countermeasures according to the hardware specification at the end-point.

More specifically, an enclave starts by executing a loader program.

The loader program then detects the hardware specification, selectively

enables the countermeasures, and finally produces an application binary

that runs with the possibly highest level of protection at the end-point.

 

Additional Information

In Campus Calendar
No
Groups

Graduate Studies

Invited Audience
Faculty/Staff, Public, Graduate students, Undergraduate students
Categories
Other/Miscellaneous
Keywords
Phd proposal
Status
  • Created By: Tatianna Richardson
  • Workflow Status: Published
  • Created On: Sep 19, 2018 - 10:34am
  • Last Updated: Sep 19, 2018 - 10:34am