Wednesday, January 1, 2025
HomeSecurity NewsSGXPECTRE New Variant of Spectre that Allows Attackers to Extract Data From...

SGXPECTRE New Variant of Spectre that Allows Attackers to Extract Data From Intel SGX Enclaves

Published on

SIEM as a Service

A new type of side channel attack(SGXPECTRE) against SGX enclaves revealed by security researchers that could compromise the security of SGX enclaves.

SGX is a hardware extension that provides an isolated shielded environment for software applications to run isolated from other software systems. The SGX extensions available with the recent versions of Intel processors.

Security researchers from Ohio State University discovered this new breed of the spectre attack in SGX that could allow the attackers to extract the secrets from the SGX enclaves. Researchers published a paper on how malicious programs can observe the codes executing SGX enclave.

- Advertisement - SIEM as a Service

The traditional side-channel attacks are feasible only if the enclave program already has secure dependent memory access patterns, but SGXPECTRE Attacks are more concerning and it completely compromises the security of the enclaves.

Researchers said “if the enclave code can be influenced by the programs that are running outside of enclave, the control flow of the external program can be temporarily altered to execute instructions that lead to observable cache-state changes.

Also Read Intel Expands Bug Bounty Program Rewards To $250,000 for Meltdown and Spectre Like Vulnerabilities

“We demonstrate end-to-end attacks to show that the adversary could learn the content of the enclave memory, as well as its register values in such attacks,” researchers said.

Such as adversary observing the changes with SGX enclaves completely defeated the confidentiality guarantee that offered by SGX enclaves.

An application that implements Retpoline which allows indirect branches to be isolated from speculative execution is immune to SGXPECTRE Attacks.

Intel is to publish updates for SgxPectre on March 16th, researchers suggested specifying the minimum CPUSVN during their development.

With the vulnerable code patterns inside the SDK runtime libraries, any code developed with Intel’s official SGX SDK will be impacted by the attacks. It doesn’t matter how the enclave program is implemented.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to...

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application...

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

North Korean Hackers Stolen $2.2 Billion From Crypto Platforms In 2024

Cryptocurrency hacking incidents in 2024 surged 21.07% YoY to $2.2 billion, with 303 breaches...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an...