Sponsored Links
-->

Kamis, 11 Januari 2018

Intel® Software Guard Extensions (SGX) | Intel Software - YouTube
src: i.ytimg.com

Intel SGX is a set of central processing unit (CPU) instruction codes from Intel that allows user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. Intel designed SGX to be useful for implementing secure remote computation, secure web browsing, and digital rights management (DRM).


Video Software Guard Extensions



Details

Support for SGX in the CPU is indicated in CPUID "Structured Extended feature Leaf", EBX bit 02, but its availability to applications requires BIOS support and opt-in enabling which is not reflected in CPUID bits. This complicates the feature detection logic for applications.

Emulation of SGX was added to experimental version of the QEMU system emulator in 2014. In 2015, researchers at the Georgia Institute of Technology released an open-source simulator known as OpenSGX.

It was introduced in 2015 with the sixth generation Intel Core microprocessors based on the Skylake microarchitecture.

One example of SGX used in security was a demo application from wolfSSL using it for cryptography algorithms. One example of a secure service built using SGX is Fortanix's key management service. This entire cloud based service is built using SGX servers and designed to provide privacy from cloud provider. An additional example is Numecent using SGX to protect the DRM that is used to authorize application execution with their Cloudpaging application delivery products.

Intel Goldmont Plus (Gemini Lake) microarchitecture will also add support for Intel SGX.


Maps Software Guard Extensions



Prime+Probe attack

On 27 March 2017 researchers at Austria's Graz University of Technology developed a proof-of-concept that can grab RSA keys from SGX enclaves running on the same system within five minutes by using certain CPU instructions in lieu of a fine-grained timer to exploit cache DRAM side-channels. One countermeasure for this type of attack was presented and published by Daniel Gruss et al. at the USENIX Security Symposium in 2017. Among other published countermeasures, one countermeasure to this type of attack was published on September 28, 2017, a compiler-based tool, DR.SGX, that claims to have superior performance with the elimination of the implementation complexity of other proposed solutions.


An Introduction to Intel® Software Guard Extensions (Intel® SGX ...
src: brightcove04pmdo-a.akamaihd.net


See also

  • Meltdown (security vulnerability)

Introduction to SGX (Software Guard Extensions) and SGX ...
src: i.ytimg.com


References


Intel® Software Guard Extensions (Intel® SGX) Webinar | Intel ...
src: brightcove04pmdo-a.akamaihd.net


External links

  • Intel Software Guard Extensions (Intel SGX) / ISA Extensions, Intel
    • Intel Software Guard Extensions (Intel SGX) Programming Reference, Intel, October 2014
    • IDF 2015 - Tech Chat: A Primer on Intel Software Guard Extensions, Intel (poster)
    • ISCA 2015 tutorial slides for Intel SGX, Intel, June 2015
  • McKeen, Frank, et al. (Intel), Innovative Instructions and Software Model for Isolated Execution // Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. ACM, 2013.
  • Joanna Rutkowska, Thoughts on Intel's upcoming Software Guard Extensions (Part 1), August 2013
  • SGX: the good, the bad and the downright ugly / Shaun Davenport, Richard Ford (Florida Institute of Technology) / Virus Bulletin, 2014-01-07
  • Victor Costan and Srinivas Devadas, Intel SGX Explained, January 2016.
  • wolfSSL, October 2016.

Source of article : Wikipedia