SGX 101
  • Home
  • SSLab
  • SGX Bootstrap
    • Overview
    • Enclave
      • Communication between Architectural and Application Enclaves
    • Attestation
      • Inter-process Local Attestation
    • Sealing
    • Real-world Example
    • CCS'17 Tutorial
    • Technion'18 Summer School Program
  • SGX Security
    • Memory Corruption
    • Uninitialized Memory
    • Page-table-based Attacks
    • Cache Attacks
    • Branch Shadowing
    • Row Hammer Attacks
    • Speculative Execution Side Channels
  • Other Resources
  • About Us
Powered by GitBook
On this page

Was this helpful?

  1. SGX Security

Cache Attacks

Introduction

One well-known class of side channels is cache attacks. By exploiting the timing difference between accessing cached and non-cached data, the attacks infer the particular the memory accesses of a victim process by manipulating CPU caches. Because an enclave shares the CPU caches with the rest of system, the enclave is vulnerable to cache attacks by design. Moreover, cache attacks launched by privileged software (under the SGX threat model) are much more powerful (e.g., more accurate) than launched by non-privileged software.

PreviousPage-table-based AttacksNextBranch Shadowing

Last updated 5 years ago

Was this helpful?