Monday, November 4, 2024
HomeSecurity NewsSGXPECTRE New Variant of Spectre that Allows Attackers to Extract Data From...

SGXPECTRE New Variant of Spectre that Allows Attackers to Extract Data From Intel SGX Enclaves

Published on

Malware protection

A new type of side channel attack(SGXPECTRE) against SGX enclaves revealed by security researchers that could compromise the security of SGX enclaves.

SGX is a hardware extension that provides an isolated shielded environment for software applications to run isolated from other software systems. The SGX extensions available with the recent versions of Intel processors.

Security researchers from Ohio State University discovered this new breed of the spectre attack in SGX that could allow the attackers to extract the secrets from the SGX enclaves. Researchers published a paper on how malicious programs can observe the codes executing SGX enclave.

- Advertisement - SIEM as a Service

The traditional side-channel attacks are feasible only if the enclave program already has secure dependent memory access patterns, but SGXPECTRE Attacks are more concerning and it completely compromises the security of the enclaves.

Researchers said “if the enclave code can be influenced by the programs that are running outside of enclave, the control flow of the external program can be temporarily altered to execute instructions that lead to observable cache-state changes.

Also Read Intel Expands Bug Bounty Program Rewards To $250,000 for Meltdown and Spectre Like Vulnerabilities

“We demonstrate end-to-end attacks to show that the adversary could learn the content of the enclave memory, as well as its register values in such attacks,” researchers said.

Such as adversary observing the changes with SGX enclaves completely defeated the confidentiality guarantee that offered by SGX enclaves.

An application that implements Retpoline which allows indirect branches to be isolated from speculative execution is immune to SGXPECTRE Attacks.

Intel is to publish updates for SgxPectre on March 16th, researchers suggested specifying the minimum CPUSVN during their development.

With the vulnerable code patterns inside the SDK runtime libraries, any code developed with Intel’s official SGX SDK will be impacted by the attacks. It doesn’t matter how the enclave program is implemented.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...