Главная
Study mode:
on
1
Outline
2
Introduction to SGX
3
Using SGX to implement Bitcoin wallets
4
Bitcoins Signatures
5
Cache Attacks
6
Prime and Rope
7
How does this work
8
Not that easy
9
Building the time
10
Physical address
11
Physical page
12
Addresses
13
Summary
14
Results
15
Performance Counter
16
Solution
17
Operating System
18
Hardware
19
Sidechain resistant crypto
20
DRM video player
21
Stealing Bitcoins
22
The Problem
23
Validity Period
24
Double Fetch Back
25
Shared Memory
26
Double Fetch Detection
27
Video Player Exploit
28
Double Fetches
29
Atomic Fetches
30
TFX
31
How it works
32
Dropit
33
Code
34
Advantages
35
Takeaways
36
Out of Scope
37
Conclusion
Description:
Explore a Black Hat conference talk that delves into the practical implementation of malware inside Intel SGX and its ability to evade state-of-the-art detection mechanisms. Learn how an unprivileged user can execute malware within an SGX enclave to extract secret RSA keys from co-located enclaves using cache attacks. Discover the intricacies of SGX protection features, Bitcoin wallets, cache attacks, and double fetch vulnerabilities. Examine the potential implications for Bitcoin theft, DRM video players, and sidechain-resistant crypto. Gain insights into proposed solutions at the operating system and hardware levels, as well as the advantages and limitations of atomic fetches and TFX. Presented by Michael Schwarz and Moritz Lipp, this 54-minute talk offers a comprehensive look at the intersection of trusted execution environments and potential security threats.

When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins

Black Hat
Add to list
0:00 / 0:00