网站首页
学术动态 首页 - 学术动态 - 正文

To Know Your Enclave’s Runtime State? Just SMILE

2022-11-22 14:33 浏览次数:

主讲人:Xuhua Ding

职务:Associate Professor of Computer Science at Singapore Management University

报告时间:2022年11月25日(周五)14:00

线下地点:湖南大学集成电路学院3楼C312会议室

腾讯会议:568-115-346

入会链接:https://meeting.tencent.com/dm/8cOeq3qWVJJh

联系人:崔津华

欢迎湖大师生、高校同行,线上线下交流!

个人简介

Xuhua Ding is currently an Associate Professor of Computer Science at Singapore Management University. With around twenty years of research experience in cybersecurity, his work spans across system and software security, applied cryptography, privacy-preserving in outsourced databases. His recent research interest focuses on virtualization based secure and trustworthy systems on x86 and ARM platforms. He has over fifty publications in top tier security journals and conferences including S&P, CCS, USENIX Security and NDSS. He has served on the technical program committees in various international conferences in the past and was the program co-chair of AsiaCCS’22.

报告摘要

SGX enclaves prevent external software from accessing their memory. This feature conflicts with legitimate needs for enclave memory introspection, e.g., runtime stack collection on an enclave under a return-oriented-programming attack. In this talk, we present SMILE as a novel technology for enclave owners to acquire live enclave contents. Leveraging a semi-trusted agent running in x86 System Management Mode, SMILE authenticates the target enclave against a malicious kernel without using the SGX attestation facility. It preserves enclave security and allows a cloud server to provide the enclave introspection service. We have implemented a SMILE prototype and run various experiments to read enclave code, heap, stack and SSA frames. The total cost for introspecting one page is less than 300 microseconds.