google-site-verification: google30a059f9a075f398.html

SGXPECTRE Attack New Variant of Spectre that Allows Attackers to Extract Data From Intel SGX Enclaves

CyberWisdom Safe Harbor Commentary on SGXPECTRE attack

A recent story from gbhackers.com reviews a new side-by-side attack (SGXPECTRE) revealed by security researchers on the Singapore exchange could jeopardize the security of the Singapore exchange.

SGX is a hardware extension that provides an isolated shielded environment for software applications to run isolated from other software systems. The latest version of Intel processors provide SGX extensions.

Security researchers from Ohio State University have uncovered new specter attacks in emerging markets that could make attackers gain secrecy from Singapore enclaves. Researchers published an essay on how malware views the code that executes the SGX enclave.

Legacy side-channel attacks are only feasible if the enclave has a safe dependency memory access mode, but the SGXPECTRE attack is more concerned with and completely compromises enclave security.

SGXPECTRE attack

“If the enclave code is likely to be affected by the program running outside the enclave, the control flow of the external program can be temporarily changed to execute instructions that result in an observable change in the cache status,” the researchers said.

The researchers said: “We show an end-to-end attack to show how much your adversary can learn about implants, and how well it registers in such attacks.”

Such as the adversary observation and changes in the enclave of the Singapore Exchange Center completely defeated the confidentiality guarantee provided by the Singapore enclave.

Applications that implement Retpoline allow indirect branching to be isolated from speculative execution, but are not affected by SGXPECTRE attacks.

Intel will release an update to SgxPectre on March 16, and researchers recommend that you specify a minimum CPUSVN during development.

Because of the vulnerable code patterns in the SDK runtime library, any code developed using the official Intel SGX SDK will be compromised. How to implement enclave scheme does not matter.

Read More…

A new type of side channel attack(SGXPECTRE) against SGX enclaves revealed by security researchers that could compromise the security of SGX enclaves. SGX is a hardware extension that provides an isolated shielded environment for software applications to run isolated from other software systems. The SGX extensions available with the recent versions of Intel processors. Security Engaging post, Read More…

thumbnail courtesy of gbhackers.com.

Spectre-related vulnerability cracks open Intel’s Software Guard Extension like a nut

https://mspoweruser.com/spectre-related-vulnerability-cracks-open-intels-software-guard-extension-like-nut/Spectre-related vulnerability cracks open Intel’s Software Guard Extension like a nut

 

If you like to receive more of these curated safe harbor news alerts then subscribe to my mailing list. and come back soon at https://www.safeharboroncyber.com/Blog/ to read further CyberWisdom Safe Harbor Commentaries. Home » Curated SafeHarboronCyber’s CyberWisdom Post » SGXPECTRE Attack New Variant of Spectre that Allows Attackers to Extract Data From Intel SGX Enclaves