VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface

Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, Flavio Garcia

Research output: Chapter in Book/Report/Conference proceedingConference contribution

400 Downloads (Pure)

Abstract

Hardware-based fault injection attacks such as voltage and clock glitching have been thoroughly studied on embedded devices. Typical targets for such attacks include smartcards and low-power microcontrollers used in IoT devices. This paper presents the first hardware-based voltage glitching attack against a fully-fledged Intel CPU. The transition to complex CPUs is not trivial due to several factors, including: a complex operating system, large power consumption, multi-threading, and high clock speeds. To this end, we have built VoltPillager, a low-cost tool for injecting messages on the Serial Voltage Identification bus between the CPU and the voltage regulator on the motherboard. This allows us to precisely control the CPU core voltage. We leverage this powerful tool to mount fault-injection attacks that breach confidentiality and integrity of Intel SGX enclaves. We present proof-of-concept key-recovery attacks against cryptographic algorithms running inside SGX. We demonstrate that VoltPillager attacks are more powerful than recent software-only undervolting attacks against SGX (CVE-2019-11157) because they work on fully patched systems with all countermeasures against software undervolting enabled. Additionally, we are able to fault security critical operations by delaying memory writes. Mitigation of VoltPillager is not straightforward and may require a rethink of the SGX adversarial model where a cloud provider is untrusted and has physical access to the hardware.
Original languageEnglish
Title of host publicationProceedings of 30th Usenix Security Symposium (USENIX Security 21)
PublisherUSENIX
Number of pages18
Publication statusPublished - 12 Sept 2020
Event30th USENIX Security Symposium 2021 (USENIX Security 21) - Vancouver, Canada
Duration: 11 Aug 202113 Aug 2021

Conference

Conference30th USENIX Security Symposium 2021 (USENIX Security 21)
Country/TerritoryCanada
CityVancouver
Period11/08/2113/08/21

Fingerprint

Dive into the research topics of 'VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface'. Together they form a unique fingerprint.

Cite this