SGX 101
  • Home
  • SSLab
  • SGX Bootstrap
    • Overview
    • Enclave
      • Communication between Architectural and Application Enclaves
    • Attestation
      • Inter-process Local Attestation
    • Sealing
    • Real-world Example
    • CCS'17 Tutorial
    • Technion'18 Summer School Program
  • SGX Security
    • Memory Corruption
    • Uninitialized Memory
    • Page-table-based Attacks
    • Cache Attacks
    • Branch Shadowing
    • Row Hammer Attacks
    • Speculative Execution Side Channels
  • Other Resources
  • About Us
Powered by GitBook
On this page

Was this helpful?

SGX Security

PreviousTechnion'18 Summer School ProgramNextMemory Corruption

Last updated 5 years ago

Was this helpful?

Although Intel SGX technology claims to deliver various security promises, which we have gone through in previous sections, it is still vulnerable to certain types of attacks. Recent academic researches have discovered several such vulnerabilities and prove that Intel SGX is not as secure as we thought.

In this section, explains known security concerns, including cache/branch side-channel attacks and memory safety issues, and corresponding defenses with various working demos.

SGX Security Issues (presented by Taesoo Kim)

Slides are available here:

Prof. Taesoo Kim
8MB
security-issues.pdf
pdf
Slides here