Title
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
Abstract
In this paper, we present HYPERRACE, an LLVM-based tool for instrumenting SGX enclave programs to eradicate all side-channel threats due to Hyper-Threading. HYPERRACE creates a shadow thread for each enclave thread and asks the underlying untrusted operating system to schedule both threads on the same physical core whenever enclave code is invoked, so that Hyper-Threading side channels are closed completely. Without placing additional trust in the operating system's CPU scheduler, HYPERRACE conducts a physical-core co-location test: it first constructs a communication channel between the threads using a shared variable inside the enclave and then measures the communication speed to verify that the communication indeed takes place in the shared L1 data cache-a strong indicator of physical-core co-location. The key novelty of the work is the measurement of communication speed without a trustworthy clock; instead, relative time measurements are taken via contrived data races on the shared variable. It is worth noting that the emphasis of HYPERRACE's defense against Hyper-Threading side channels is because they are open research problems. In fact, HYPERRACE also detects the occurrence of exception-or interrupt-based side channels, the solution.s of which have been studied by several prior works.
Year
DOI
Venue
2018
10.1109/SP.2018.00024
2018 IEEE Symposium on Security and Privacy (SP)
Keywords
Field
DocType
Hyper Threading,SGX,HYPERRACE,side channels
Interrupt,Open research,Computer science,Computer security,Instruction set,Communication channel,Thread (computing),Hyper-threading,Side channel attack,Novelty
Conference
ISSN
ISBN
Citations 
1081-6011
978-1-5386-4354-9
0
PageRank 
References 
Authors
0.34
13
8
Name
Order
Citations
PageRank
Guoxing Chen1676.31
Wenhao Wang26010.80
Tianyu Chen3126.58
Sanchuan Chen442.40
Yinqian Zhang594548.00
Xiaofeng Wang62543161.68
T. H. Lai71069.30
Dongdai Lin81411.50