SGX 101
  • Home
  • SSLab
  • SGX Bootstrap
    • Overview
    • Enclave
      • Communication between Architectural and Application Enclaves
    • Attestation
      • Inter-process Local Attestation
    • Sealing
    • Real-world Example
    • CCS'17 Tutorial
    • Technion'18 Summer School Program
  • SGX Security
    • Memory Corruption
    • Uninitialized Memory
    • Page-table-based Attacks
    • Cache Attacks
    • Branch Shadowing
    • Row Hammer Attacks
    • Speculative Execution Side Channels
  • Other Resources
  • About Us
Powered by GitBook
On this page
  • Introduction
  • Branch Shadowing

Was this helpful?

  1. SGX Security

Branch Shadowing

PreviousCache AttacksNextRow Hammer Attacks

Last updated 5 years ago

Was this helpful?

Introduction

Another unique class of side-channel attacks in the SGX settings is branch-prediction-based attacks. By exploiting the branch predictor, the attacks infer the states (taken or non-taken) of branches executed by an enclave. This section demonstrates the attack.

Branch Shadowing

This video shows how the branch shadowing attack can extract RSA private key bits

  • Target code: Sliding window exponentiation of mbedTLS

  • Attack code: We modified Linux SGX SDK to run our shadow code

  • Kernel log: Our attack code prints the output of LBR via dmesg