Supply chain malware targets SGX: Take care of what you sign

07/11/2019
by   Andrei Mogage, et al.
0

Malware attacks represent a significant part of today's security threats. Software guard extensions (SGX) are a set of hardware instructions introduced by Intel in their recent lines of processors that are intended to provide a secure execution environment for user-developed applications. To our knowledge, there was no serious attempt yet to overcome the SGX protection by leveraging the software supply chain infrastructure, such as weaknesses in the development, build or signing servers. While SGX protection does not specifically take into consideration such threats, we show in the current paper that a simple malware attack exploiting a separation between the build and signing processes can have a serious damaging impact, practically nullifying the SGX integrity protection measures. Finally, we also suggest some possible mitigations against the attack.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/28/2018

A Survey of Cyber Security Countermeasures Using Hardware Performance Counters

Cyber attacks and malware are now more prevalent than ever and the trend...
research
08/20/2023

A review of SolarWinds attack on Orion platform using persistent threat agents and techniques for gaining unauthorized access

This paper of work examines the SolarWinds attack, designed on Orion Pla...
research
07/14/2023

Evaluation Methodologies in Software Protection Research

Man-at-the-end (MATE) attackers have full control over the system on whi...
research
10/11/2022

Software Supply Chain Attribute Integrity (SCAI)

The Software Supply Chain Attribute Integrity, or SCAI (pronounced "sky"...
research
11/28/2019

RIoTS: Risk Analysis of IoT Supply Chain Threats

Securing the supply chain of information and communications technology (...
research
10/11/2018

USBCaptchaIn: Preventing (Un)Conventional Attacks from Promiscuously Used USB Devices in Industrial Control Systems

Industrial Control Systems (ICS) are sensible targets for high profile a...
research
05/26/2019

TEE-aided Write Protection Against Privileged Data Tampering

Unauthorized data alteration has been a longstanding threat since the em...

Please sign up or login with your details

Forgot password? Click here to reset