Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX

USENIX via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a 23-minute conference talk from USENIX Security '18 that delves into novel exploitation techniques against Intel Software Guard Extensions (SGX). Learn about the vulnerabilities in SGX that can be exploited without kernel privileges or causing enclave crashes, even in the presence of existing randomization approaches like SGX-Shield. Understand the concept of the Guard's Dilemma, the CONT primitive, and how these attacks can be applied to enclaves developed with the standard Intel SGX SDK on both Linux and Windows. Gain insights into the potential security risks associated with SGX and the proposed mitigations to address these vulnerabilities.

Syllabus

Intro
Intel SGX (software Guard extensions)
SGX provides strong isolation
Control-Flow Attacks
Related work
The SGX SDK
The Guard's Dilemma
Motivation
The Basic Idea
The CONT Primitive
Attack Overview
Example Attack
Attacking SGX-Shield
SGX-Shield Exploit
Mitigations
Conclusion

Taught by

USENIX

Reviews

Start your review of The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.