Memory Corruption Attacks Against Intel SGX - Invited Talk

Author(s):
Lucas Davi
Name of Event:
DC-Area Anonymity, Privacy, and Security Seminar
Location:
Washington D.C., USA
Date:
05.12.2019

Abstract

The Intel Software Guard Extensions (SGX) technology allows an application developer to isolate security-critical code and data inside a protected memory area called enclave. While most research has studied side-channel attacks against SGX this talk will investigate memory corruption attacks such as return-oriented programming in the context of SGX. We will demonstrate how an attacker can exploit the Intel SDK libraries to compromise enclaves and steal secret information. In addition we will investigate the host-to-enclave boundary and its susceptibility to memory corruption attacks.

Seminar Homepage: dcaps.info/2019-12-05.html