Vulnerabilities / Threats

3/7/2018
06:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Intel SGX Can Be Used to Hide, Execute Malware

The microprocessor giant's Software Guard Extensions security feature can be abused to implement virtually undetectable malware, Graz University researchers say.

In a talk at the Black Hat Asia conference later this month, researchers from the Graz University of Technology in Austria plan to show how attackers can abuse Intel's Software Guard Extensions (SGX) microprocessor security feature to steal cryptographic keys and other secrets.

The researchers will present proof-of-concept malware that takes advantage of SGX's code protection features to hide from state-of-the-art detection tools. They will show how the malware can be used to mount an attack for extracting RSA keys and other code that SGX is specifically designed to protect.

According to the researchers, the exploit is the first involving malware running on SGX hardware. Additionally, the researchers will show how such exploits can be used to search for and abuse so-called double-fetch privilege escalation vulnerabilities in secure enclaves — or the special execution environments in SGX.

The main takeaway is that SGX can help attackers hide and execute malware without requiring any root privileges, or operating system modifications says Michael Schwarz, a doctoral student in information security at Graz University.

"This attack, and also the detection of double-fetch bugs, shows that SGX is not this perfect black box, but that certain activities can be observed from the outside," Schwarz says.

SGX is a security mechanism that Intel introduced with its Skylake processor architecture. It is designed to protect code and data from leaks and disclosure. As Schwarz notes in a technical paper, SGX uses secure enclaves working in hardware-isolated memory areas to protect application secrets from hardware attacks. Such enclaves can be used to securely store hardware-encrypted passwords, password managers, cryptographic keys, bitcoin wallets, and other secrets.

Schwarz says his malware does not exploit any vulnerability in SGX. Rather it takes advantage of the fact that Intel considers software-based side-channel attacks on SGX as not possible and therefore out of scope. Side channel attacks gather and use information about some aspect of a system's physical operation to attack and expose sensitive data.

According to Schwarz, despite the restrictions of SGX, attackers can execute malware inside an SGX enclave and use that enclave to then attack and extract data from other enclaves.

"We show how easy it is to extract real-world 4096-bit RSA keys across enclaves using the widespread mbed TLS crypto library," he says. The attack is not limited to RSA, but can be applied to any software, which leaks secrets when attacked via software-based side-channel attacks, Schwarz notes.

"As a further exploit, we show how one can utilize cache attacks to automatically detect double-fetch bugs in scenarios where the code and the binary is not known," he says. Also in the cards is a demonstration of how such vulnerabilities can be exploit using the shared cache, he adds.

The exploit against SGX itself is harder to mount than a regular zero-day exploit, Schwarz concedes. But for someone with a background in micro-architectural attacks, it is perfectly doable, he says. In fact, several undergraduate and graduate level students at Graz University have already mounted such attacks, he claims.

"We require the cryptographic implementation to not be hardened against software-based side-channel attacks," Schwarz says. "Other than that, there are no special requirements."

Related Content:

 

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: In Russia, application hangs YOU!
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17177
PUBLISHED: 2018-09-18
An issue was discovered on Neato Botvac Connected 2.2.0 and Botvac 85 1.2.1 devices. Static encryption is used for the copying of so-called "black box" logs (event logs and core dumps) to a USB stick. These logs are RC4-encrypted with a 9-character password of *^JEd4W!I that is obfuscated ...
CVE-2018-17178
PUBLISHED: 2018-09-18
An issue was discovered on Neato Botvac Connected 2.2.0 devices. They execute unauthenticated manual drive commands (sent to /bin/webserver on port 8081) if they already have an active session. Commands like forward, back, arc-left, arc-right, pivot-left, and pivot-right are executed even though the...
CVE-2018-11869
PUBLISHED: 2018-09-18
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, lack of length validation check for value received from firmware can lead to buffer overflow in WMA handler.
CVE-2018-17176
PUBLISHED: 2018-09-18
A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. Manual control mode requires authentication, but once recorded, the authentication (always transmitted in cleartext) can be replayed to /bin/webserver on port 8081. There are no nonces, and timestamps are not checked at all.
CVE-2018-11852
PUBLISHED: 2018-09-18
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, improper check In the WMA API for the inputs received from the firmware and then fills the same to the host structure will lead to OOB write.