Spectre vulnerability punches holes in Intel SGX secure environment

Posted on Thursday, March 01 2018 @ 12:50 CET by Thomas De Maesschalck
intc logo
Security researchers warn that the Spectre CPU vulnerabilities also have an impact on Intel's Software Guard eXtensions (SGX), a technology that lets software run in allocated private regions of memory. These enclaves offer protection against interference from processes running at higher privilege levels. Examples of applications of SGX include digital rights management (DRM), secure web browsing and secure remote computation.

Now The Register reports that Spectre vulnerabilities could be used to snoop on these enclaves:
These areas are called enclaves, and are typically used to run things like anti-piracy code without anyone spying on the decryption keys, or to run sensitive computational code on an untrusted remote machine. Attestation is used to ensure software on one box is talking to code running unaltered in an enclave on another box.

The speculative execution flaws revealed in January, however, jeopardize SGX's security boundaries, as demonstrated in the video below. As is to be expected, exploiting the chip-level vulnerabilities requires local access: a miscreant must be able to log in, or malware must be running in order to leverage the design blunder to attack an SGX enclave.


About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



Loading Comments