Talk: Blurring Enclave Page Accesses in Space and Time with Compile-Time Instrumentation
Home Research Details
Daan Vanoverloop, Andrés Sánchez, Victor Bullynck, Flavio Toffalini, Frank Piessens, Mathias Payer, Jo Van Bulck

Talk: Blurring Enclave Page Accesses in Space and Time with Compile-Time Instrumentation

0.0 (0 ratings)

Introduction

Talk: blurring enclave page accesses in space and time with compile-time instrumentation. Explore TLBlur, a novel compile-time instrumentation approach leveraging Intel SGX AEX-Notify to blur enclave page accesses, effectively limiting controlled-channel attacks.

0
32 views

Abstract

This talk overviews our recent work on TLBlur, a novel approach that leverages compiler instrumentation and the recent AEX-Notify hardware extension in modern, off-the-shelf Intel SGX processors to limit the bandwidth of controlled-channel attacks at acceptable performance overhead. We also discuss ongoing efforts to reduce instrumentation costs through binary layout optimizations.


Review

This talk outlines "TLBlur," a promising new approach to mitigating controlled-channel attacks against Intel SGX enclaves. The work leverages a novel combination of compiler instrumentation and the recent AEX-Notify hardware extension, a strategy that appears well-suited to the complexities of secure enclave execution environments. By aiming to limit the bandwidth of information leakage, TLBlur addresses a critical security challenge in practical, off-the-shelf SGX processors, making this contribution highly relevant to the field of system security and trusted computing. The abstract positions this as "recent work," suggesting that while promising, it may still be evolving. The core strength of TLBlur lies in its integrated methodology, employing compile-time instrumentation to blur enclave page accesses in both space and time, a sophisticated defense strategy. The reliance on the AEX-Notify hardware extension is particularly noteworthy, indicating a deep understanding of SGX's architectural features to achieve fine-grained control and enhance security. The claim of achieving this protection "at acceptable performance overhead" is a crucial aspect, as practical security solutions often falter due to excessive performance penalties. Furthermore, the abstract highlights an awareness of these performance considerations by mentioning ongoing efforts to optimize instrumentation costs through binary layout optimizations, which speaks to a thorough and practical development mindset. While the abstract provides a compelling overview, a full technical paper or subsequent publication would benefit from a deeper dive into several areas. It would be valuable to understand the precise mechanisms through which AEX-Notify contributes to the "blurring" effect and how "space and time" are leveraged in practice. Quantifiable metrics regarding the "bandwidth" reduction for specific controlled-channel attacks and a detailed analysis of the "acceptable performance overhead," including specific benchmarks and methodologies, would significantly strengthen the claims. Finally, an elaboration on the effectiveness and impact of the ongoing binary layout optimizations would provide crucial insight into the practicality and efficiency of the TLBlur system. This work presents a compelling direction for enhancing enclave security, and further empirical data would be highly anticipated.


Full Text

You need to be logged in to view the full text and Download file of this article - Talk: Blurring Enclave Page Accesses in Space and Time with Compile-Time Instrumentation from Proceedings of the Microarchitecture Security Conference .

Login to View Full Text And Download

Comments


You need to be logged in to post a comment.