[1]张亚晖,赵 敏,韩 欢.针对 SGX 的攻击与防御综述[J].计算机技术与发展,2020,30(11):104-110.[doi:10. 3969 / j. issn. 1673-629X. 2020. 11. 020]
 ZHANG Ya-hui,ZHAO Min,HAN Huan.Survey of Attacks and Defenses against SGX[J].,2020,30(11):104-110.[doi:10. 3969 / j. issn. 1673-629X. 2020. 11. 020]
点击复制

针对 SGX 的攻击与防御综述()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
30
期数:
2020年11期
页码:
104-110
栏目:
安全与防范
出版日期:
2020-11-10

文章信息/Info

Title:
Survey of Attacks and Defenses against SGX
文章编号:
1673-629X(2020)11-0104-07
作者:
张亚晖1赵 敏2韩 欢1
1. 陆军工程大学,重庆 400035; 2. 陆军工程大学,江苏 南京 210007
Author(s):
ZHANG Ya-hui1ZHAO Min2HAN Huan1
1. Army Engineering University of PLA,Chongqing 400035,China; 2. Army Engineering University of PLA,Nanjing 210007,China
关键词:
SGX威胁模型可信计算基攻击类型防御措施
Keywords:
SGXthreat modeltrusted computing baseattack vectorscountermeasures
分类号:
TP311
DOI:
10. 3969 / j. issn. 1673-629X. 2020. 11. 020
摘要:
如何防止恶意攻击者窃取用户数据或隐私,是当前信息安全领域研究的热难点问题。 2013 年,Intel 公司在 HASP 会议上提出了新的处理器安全技术 SGX(software guard extensions,软件保护扩展), 能够在计算平台上提供一个可信的隔离空间 enclave,用于保障用户代码和数据的机密性和完整性。 SGX 是信息安全领域突破性的研究成果, 对于个人用户和云计算平台用户都具有重大意义。 但同时针对 SGX 的攻击的威胁模型非常强大,SGX 的攻击面不断地被发掘,其防御技术也不断更新。 为更好地研究针对 SGX 的攻击与防御技术,介绍了针对 SGX 攻击的威胁模型,总结归纳了针对 SGX 的攻击类型,分析了针对 SGX 攻击的防御措施,并对未来可能的针对 SGX 的攻击与防御技术进行了探讨。
Abstract:
How to deal with the increasingly severe information security situation and prevent malicious attackers from stealing user data or privacy is a hot and difficult problem in the current information security field. In 2013, a new processor security technology SGX(software guard extensions) is proposed by Intel at the HASP conference,which can provide a trusted zone named enclave on the computing platform to protect the confiden-tiality and integrity of user code and data. SGX is a breakthrough research achievement in the field of information security,which is of great significance to individual users and tenants of cloud computing platforms. However,the threat model of SGX is quite strong,the attack surface against SGX is constantly being explored,and its defense technology is constantly updated. For in-depth research on SGX attack and defense technologies,we introduce the threat model of SGX,summarize the attack types against SGX, analyze the defense measures against SGX attacks, and discuss future possible attack and defense techniques against SGX.

相似文献/References:

[1]王 冠,张倩倩.基于 SGX 的车联网身份认证方案研究[J].计算机技术与发展,2023,33(11):99.[doi:10. 3969 / j. issn. 1673-629X. 2023. 11. 015]
 WANG Guan,ZHANG Qian-qian.Research on Identity Authentication Scheme Based on SGX in Internet of Vehicles[J].,2023,33(11):99.[doi:10. 3969 / j. issn. 1673-629X. 2023. 11. 015]

更新日期/Last Update: 2020-11-10