Skip to main content

Researchers bypass Intel's Software Guard Extensions to access RSA keys

Close-up of hands on a laptop keyboard in a dark room.
Dmitry Tishchenko/123RF
Intended to help users keep their systems safe and secure, Intel Software Guard Extensions is a set of CPU instructions that can make particular portions of code and data private. However, a new paper suggests that SGX could in fact be used to facilitate a malicious attack.

Samuel Weiser and four collaborators from the Graz University of Technology in Austria have published research that demonstrates how SGX can be used to conceal a piece of malware. Within minutes, this technique was used to gain access to RSA keys hidden in SGX enclaves, according to a report from The Register.

The researchers developed a method of monitoring vulnerable cache sets that allowed them to spot the telltale signature of an RSA key calculation. “Key recovery comes in three steps,” reads the paper. “First, traces are preprocessed. Second, a partial key is extracted from each trace. Third, the partial keys are merged to recover the private key.”

Tests were run on an SGX-capable Lenovo ThinkPad T460S, which was running Ubuntu version 16.10. The team found that a single cache trace offered access to 96 percent of a 4,096-bit RSA key, and it only took eleven traces for the complete key to be assembled. The process took less than five minutes.

The authors of the paper said it’s possible to block the type of attack that they’ve demonstrated. However, the responsibility of addressing the vulnerability falls to Intel, as changes made to operating systems could end up causing further damage to the SGX model.

This isn’t the first time that Weiser has gone public with evidence that SGX is vulnerable. In January 2017, he was part of a group of researchers that published a paper that demonstrated how its input-output protections could be abused to gain access to private user data.

Digital Trends was given the following statement by Intel:

There have been many academic articles looking at the security of SGX, including side-channel attacks. In general these papers do not demonstrate anything new or unexpected about the Intel SGX architecture.

Preventing side channel attacks is a matter for the enclave developer. Intel makes this clear In the security objectives for SGX, which are well documented. The types of side-channel attacks identified on the RSA implementation used in the Graz paper were well-known for some time and are addressed by other crypto libraries available to developers (e.g. OpenSSL).

Updated on 03-17-2017 by Brad Jones: Added statement from Intel.

Editors' Recommendations

Brad Jones
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
Intel will leverage its chip-making expertise for quantum research
8th gen intel core launch

Intel has detailed plans to forge its own path toward a chip that can facilitate quantum computing. The company will apparently eschew the strategies being implemented by other organizations working in this space in an attempt to adapt the silicon transistors commonly used in traditional computers to the task.

This represents a significant diversion from other groups looking to further the current state of quantum computing. At present, the superconducting qubits process seems to be the frontrunner in terms of popularity, while an implementation based around trapped ions has also demonstrated promising results.

Read more
Liquid silicon chips could integrate hardware, software for performance boost
AMD's new Trinity family of processors looks to take on Ivy-Bridge in the low-end CPU market.

Today's PC processors keep getting more powerful even as they use smaller and smaller transistors. Moore's law, which states that computer processing power will double every two years, has been put under some pressure in recent years and it is questionable if current technology will be able to keep up.

It is a good thing, then, that scientists and researchers continue to look into new ways to keep Moore's law alive. One group that is taking a particularly unusual approach is a group of researchers looking at liquid silicon at the University of Wisconsin-Madison, Phys.org reports.

Read more
Researchers: Intel CPUs are inherently flawed and open to a specific attack
8th gen intel core launch building 01

Most of us use our computers to manage some of the most important aspects of our lives, from our personal and business finances to recording our private lives to conducting most of our communications. If someone can break into our computers, they can steal our information, our identities, and generally make our lives miserable.

A recent paper, published by a joint research tem from the State University of New York at Binghamton, and the University of California Riverside, alleges that certain processors are inherently flawed and open to attack, according to Ars Technica. The flaw works against a specific method used by modern operating systems, including both Windows and MacOS, to keep systems secure called "address space layout randomization," or ASLR.

Read more