Git Product home page Git Product logo

stanplatinum / elf-respect Goto Github PK

View Code? Open in Web Editor NEW
10.0 6.0 2.0 364.19 MB

https://arxiv.org/pdf/2007.10513.pdf

Home Page: https://github.com/StanPlatinum/Deflection

Makefile 1.20% C++ 3.50% C 79.39% Shell 1.45% Assembly 1.79% Python 0.03% sed 0.01% CMake 0.01% LLVM 0.18% Roff 1.19% M4 0.78% Perl 10.42% DIGITAL Command Language 0.01% eC 0.01% Module Management System 0.01% Emacs Lisp 0.01% Batchfile 0.01% PHP 0.01%
sgx tee sfi cfi loader

elf-respect's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

elf-respect's Issues

Determine which memory writes are data leakages

Dyninst can instrument every memory write. However, we need to determine whether a particular memory write is leaking user data.

We discuss the rules of determining whether a memory writes leaks data in this issue.

Check whether Dyninst analysis component can be run in SGX

To check whether a binary is rewritten as we demand, we need to use the binary analysis components of Dyninst, including SymtabAPI, InstructionAPI, and ParseAPI.

We discuss whether these Dyninst components can be run in SGX. If not, how to make them running in SGX.

Preventing the attacker from redirecting the control flow during runtime if an attacker knows the details of our data-leaking-protection method

@heartever ๅธˆๅ…„'s words reminds me that an attacker may commit a control flow hijack to bypass our data-leakage checking. Our tentative solution is to use Intel TSX (HLE) feature that makes our checker (code for data-leakage check) a transaction. I think the idea is great and it's easy to implement. However, it seems that the introduced performance overhead is not negligible...

Defending against dynamically loading or injecting leaking code into W+X page

Static analysis may not be able to defend against this attack: an attacker loads code, which leaks information, into a location and executes it at runtime.
Since SGX don't support JIT compile nor system call, the attacker may not loads code at runtime. But it seems that SGX applications can be loaded dynamically, and it has a mechanism to modify the properties of pages.
So, if this kind attack exists, how we handle it?

Defende against side/covert channels

We could take some actions to add some side/covert-channel-free proofs with the target program, and verify them inside the enclave.

To defend against covert channel, we could eliminate all the dependencies between input data and service code's control flow.

To defend some certain type of side channels, we could use some specific policies to confine the target program.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.