Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/118453
Citations
Scopus Web of Science® Altmetric
?
?
Type: Journal article
Title: CacheQuote: efficiently recovering long-term secrets of SGX EPID via cache attacks
Author: Dall, F.
De Micheli, G.
Eisenbarth, T.
Genkin, D.
Heninger, N.
Moghimi, A.
Yarom, Y.
Citation: Transactions on Cryptographic Hardware and Embedded Systems, 2018; 2018(2):171-191
Publisher: IACR Transactions on Cryptographic Hardware and Embedded Systems
Issue Date: 2018
ISSN: 2569-2925
2569-2925
Statement of
Responsibility: 
Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi and Yuval Yarom
Abstract: Intel Software Guard Extensions (SGX) allows users to perform secure computation on platforms that run untrusted software. To validate that the compu- tation is correctly initialized and that it executes on trusted hardware, SGX supports attestation providers that can vouch for the user’s computation. Communication with these attestation providers is based on the Extended Privacy ID (EPID) protocol, which not only validates the computation but is also designed to maintain the user’s privacy. In particular, EPID is designed to ensure that the attestation provider is unable to identify the host on which the computation executes. In this work we investigate the security of the Intel implementation of the EPID protocol. We identify an implementation weakness that leaks information via a cache side channel. We show that a malicious attestation provider can use the leaked information to break the unlinkability guarantees of EPID. We analyze the leaked information using a lattice-based approach for solving the hidden number problem, which we adapt to the zero-knowledge proof in the EPID scheme, extending prior attacks on signature schemes
Keywords: SGX; side-channel attacks; EPID; hidden number problem; zero- knowledge proofs
Rights: Copyright (c) 2018 IACR Transactions on Cryptographic Hardware and Embedded Systems Licensed under Creative Commons License CC-BY 4.0
DOI: 10.13154/tches.v2018.i2.171-191
Appears in Collections:Aurora harvest 8
Computer Science publications

Files in This Item:
File Description SizeFormat 
hdl_118453.pdfPublished version648.73 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.