Overview
This course aims to teach novel exploitation techniques against Intel SGX that do not require enclave crashes and work in the presence of existing SGX randomization approaches. The course covers topics such as Intel SGX, control-flow attacks, the SGX SDK, the Guard's Dilemma, and attacking SGX-Shield. The teaching method includes lectures and examples. This course is intended for individuals interested in cybersecurity, software security, and Intel SGX technology.
Syllabus
Intro
Intel SGX (software Guard extensions)
SGX provides strong isolation
Control-Flow Attacks
Related work
The SGX SDK
The Guard's Dilemma
Motivation
The Basic Idea
The CONT Primitive
Attack Overview
Example Attack
Attacking SGX-Shield
SGX-Shield Exploit
Mitigations
Conclusion
Taught by
USENIX