Главная
Study mode:
on
1
Intro
2
TEES Trusted Execution Environments
3
DVES Dynamic voltage and frequency scaling
4
Undervolting Intel CPUs
5
Investigating faults in SGX
6
Fault analysis
7
Detailed CPU testing
8
Faulting RSA
9
Faulting AES-NÍ
10
When a single random byte fault is induced at the input of the eighth round, the AES key can be deduced. The computation complexity to recover 128 bit key is: 232 +256 encryptions.
11
Memory corruption
12
To summarise
Description:
Explore the Plundervolt attack, a software-based fault injection technique targeting Intel SGX, in this IEEE conference talk. Delve into the exploitation of privileged interfaces for dynamic frequency and voltage scaling in modern processors, particularly Intel Core series. Understand how adversaries can manipulate voltage to compromise the integrity of Intel SGX enclave computations, bypassing memory encryption and authentication safeguards. Examine real-world attack scenarios, including key recovery from cryptographic algorithms and inducing memory safety vulnerabilities in secure enclave code. Learn about the challenges of mitigating Plundervolt and the potential need for microcode updates or hardware modifications to ensure trusted computing base recovery.

Plundervolt - Software-Based Fault Injection Attacks against Intel SGX

IEEE
Add to list
0:00 / 0:00