Practical Enclave Malware with Intel SGX

Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. However, Intel’s threat model for SGX assumes fully trusted enclaves and there doubt about how realistic this is. In particular, it is unclear to what extent enclave malware could harm a sys...

Full description

Saved in:
Bibliographic Details
Published inDetection of Intrusions and Malware, and Vulnerability Assessment Vol. 11543; pp. 177 - 196
Main Authors Schwarz, Michael, Weiser, Samuel, Gruss, Daniel
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2019
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3030220370
9783030220372
ISSN0302-9743
1611-3349
DOI10.1007/978-3-030-22038-9_9

Cover

Loading…
Abstract Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. However, Intel’s threat model for SGX assumes fully trusted enclaves and there doubt about how realistic this is. In particular, it is unclear to what extent enclave malware could harm a system. In this work, we practically demonstrate the first enclave malware which fully and stealthily impersonates its host application. Together with poorly-deployed application isolation on personal computers, such malware can not only steal or encrypt documents for extortion but also act on the user’s behalf, e.g., send phishing emails or mount denial-of-service attacks. Our SGX-ROP attack uses new TSX-based memory-disclosure primitive and a write-anything-anywhere primitive to construct a code-reuse attack from within an enclave which is then inadvertently executed by the host application. With SGX-ROP, we bypass ASLR, stack canaries, and address sanitizer. We demonstrate that instead of protecting users from harm, SGX currently poses a security threat, facilitating so-called super-malware with ready-to-hit exploits. With our results, we demystify the enclave malware threat and lay ground for future research on defenses against enclave malware.
AbstractList Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. However, Intel’s threat model for SGX assumes fully trusted enclaves and there doubt about how realistic this is. In particular, it is unclear to what extent enclave malware could harm a system. In this work, we practically demonstrate the first enclave malware which fully and stealthily impersonates its host application. Together with poorly-deployed application isolation on personal computers, such malware can not only steal or encrypt documents for extortion but also act on the user’s behalf, e.g., send phishing emails or mount denial-of-service attacks. Our SGX-ROP attack uses new TSX-based memory-disclosure primitive and a write-anything-anywhere primitive to construct a code-reuse attack from within an enclave which is then inadvertently executed by the host application. With SGX-ROP, we bypass ASLR, stack canaries, and address sanitizer. We demonstrate that instead of protecting users from harm, SGX currently poses a security threat, facilitating so-called super-malware with ready-to-hit exploits. With our results, we demystify the enclave malware threat and lay ground for future research on defenses against enclave malware.
Author Weiser, Samuel
Schwarz, Michael
Gruss, Daniel
Author_xml – sequence: 1
  givenname: Michael
  surname: Schwarz
  fullname: Schwarz, Michael
  email: michael.schwarz@iaik.tugraz.at
  organization: Graz University of Technology, Graz, Austria
– sequence: 2
  givenname: Samuel
  surname: Weiser
  fullname: Weiser, Samuel
  organization: Graz University of Technology, Graz, Austria
– sequence: 3
  givenname: Daniel
  surname: Gruss
  fullname: Gruss, Daniel
  organization: Graz University of Technology, Graz, Austria
BookMark eNpFkE1PwzAMhgMMxDb2C7j0yCXgfLRxjmgaY9IQSIDELUobdxtU7Wg79vdpNyQOlv3afi35GbFBWZXE2LWAWwFg7qxBrjgo4FKCQm6dPWEj1TUO2p6yoUiE4Eppe_Y_MDBgw77m1mh1wUZCgJEqTkBfsknTfAL0e2hRD9nNS-2zdpP5IpqVWeF_KHryxd7XFO037TpalC0V0ev844qd575oaPKXx-z9YfY2feTL5_lier_kK4mi5VYHnVEOaSwRU0tJCFoZ9EkwIREBUzAUQqxIm2BTG1KUGtM4Rp-LADmpMRPHu8223pQrql1aVV-NE-B6KK6D4pTr3nMHCK6D0nn00bOtq-8dNa2j3pRR2da-yNZ-21LduNhKgVY6gXEXqH4BropgnQ
ContentType Book Chapter
Copyright Springer Nature Switzerland AG 2019
Copyright_xml – notice: Springer Nature Switzerland AG 2019
DBID FFUUA
DEWEY 353.00722000000002
DOI 10.1007/978-3-030-22038-9_9
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Government
Computer Science
EISBN 3030220389
9783030220389
EISSN 1611-3349
Editor Perdisci, Roberto
Almgren, Magnus
Giacinto, Giorgio
Maurice, Clémentine
Editor_xml – sequence: 1
  fullname: Giacinto, Giorgio
– sequence: 2
  fullname: Perdisci, Roberto
– sequence: 3
  fullname: Almgren, Magnus
– sequence: 4
  fullname: Maurice, Clémentine
EndPage 196
ExternalDocumentID EBC5921892_185_188
GroupedDBID 38.
AABBV
AEDXK
AEJLV
AEKFX
AIFIR
ALEXF
ALMA_UNASSIGNED_HOLDINGS
AYMPB
BBABE
CXBFT
CZZ
EXGDT
FCSXQ
FFUUA
I4C
IEZ
MGZZY
NSQWD
OORQV
SBO
TPJZQ
TSXQS
Z7R
Z7S
Z7U
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z88
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-g281t-94d4cef0b5288b9e6dd4378a6d7d61d8b07edd53e47d9b9db8248b558af1d0fe3
ISBN 3030220370
9783030220372
ISSN 0302-9743
IngestDate Tue Jul 29 20:10:58 EDT 2025
Fri Apr 04 22:39:50 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum QA76.9.A25
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-g281t-94d4cef0b5288b9e6dd4378a6d7d61d8b07edd53e47d9b9db8248b558af1d0fe3
OCLC 1107235604
PQID EBC5921892_185_188
PageCount 20
ParticipantIDs springer_books_10_1007_978_3_030_22038_9_9
proquest_ebookcentralchapters_5921892_185_188
PublicationCentury 2000
PublicationDate 2019
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – year: 2019
  text: 2019
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Security and Cryptology
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings
PublicationTitle Detection of Intrusions and Malware, and Vulnerability Assessment
PublicationYear 2019
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Hartmanis, Juris
Mattern, Friedemann
Goos, Gerhard
Steffen, Bernhard
Kittler, Josef
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology Madras, Chennai, India
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: TU Dortmund University, Dortmund, Germany
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 12
  givenname: Gerhard
  surname: Goos
  fullname: Goos, Gerhard
  organization: Karlsruhe, Germany
– sequence: 13
  givenname: Juris
  surname: Hartmanis
  fullname: Hartmanis, Juris
  organization: Ithaca, USA
SSID ssj0002208984
ssj0002792
Score 2.3523476
Snippet Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. However, Intel’s threat model for SGX assumes...
SourceID springer
proquest
SourceType Publisher
StartPage 177
SubjectTerms Intel SGX
Malware
Trusted execution environments
Title Practical Enclave Malware with Intel SGX
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5921892&ppg=188
http://link.springer.com/10.1007/978-3-030-22038-9_9
Volume 11543
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELa2ywVx4C3KSzlwQKyCko2d2AcOFVpaqtILbbU3K34EDkt62KwQvfDXmfEjyQYu5ZAo67Viez5nPB7Pg5A3lSm0qblJKUjfKTWMpgoEcfiuQDyG5Q9mAW4Uv5yXJ5f0dM3Ws9nvkdXSrlPv9c0__Ur-B1UoA1zRS_YWyPYvhQJ4BnzhDgjDfSL87qtZvS2L7ayO8t7nFp0nnFGbt5zY_Ky9dhl_Xu02GFza2cH-Whz1wTiHU5jvUP1makbvDmwwV7NXHf_YDeXH0Np2cFEfTzwfAQmhX7V645Mbud54na_zW1l8PV57foZxlrcfzsJJxvl15wzEFjHZROQ9Y-UE-kPtKSeicnKi3hw0bHu7WVhN0e-3qMYKTyhKYc_jmaD1TLrE0IuFD3UaGG8eksH4NTz3WXL_Wh7GFiHw5hRbA34vxQE5qDibkztHq9Ozq15JB_9zgY68YWnHaIv-WMp3Cp2FYqdDALFhEH2MKx_GeNLi3o5mcgjvZJuLB-Qe-rsk6IgC1HtIZrZ9RO5HAJIAwGPytgc2CcAmAdgEgU0csAkA-4RcflpdfDxJQ56N9NuS510qqKHaNpliS86VsKUxtKh4XZrKlLnhKqusMaywtDJCCaP4knLFGK-b3GSNLZ6SeXvd2mckEVrRvOGGNULTWmslmqzUpc5qA9w-qw9JGkctnTVAMEHWfoxbyQTInGIpQYyEix-Sd5E0EqtvZQyzDSSVhQSSSkdSCSR9fpvKL8jdYcK-JHP4Su0rkC879TrMgj9GlXHb
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Detection+of+Intrusions+and+Malware%2C+and+Vulnerability+Assessment&rft.au=Schwarz%2C+Michael&rft.au=Weiser%2C+Samuel&rft.au=Gruss%2C+Daniel&rft.atitle=Practical+Enclave+Malware+with+Intel+SGX&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2019-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783030220372&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=177&rft.epage=196&rft_id=info:doi/10.1007%2F978-3-030-22038-9_9
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5921892-l.jpg