back to article Boffins show Intel's SGX can leak crypto keys

A researcher who in January helped highlight possible flaws in Intel's Software Guard Extensions' input-output protection is back, this time with malware running inside a protected SGX enclave. Instead of protecting the system, Samuel Weiser and four collaborators of Austria's Graz University of Technology write that the proof …

  1. Louis Schreurs BEng

    Blueprint

    I would do it the same way.

  2. Bronek Kozicki Silver badge
    Thumb Up

    Impressive work

  3. John Smith 19 Gold badge
    Unhappy

    Well done researchers. Especially devising the high resolution timer.

    Not so good news for Intel.

    But the question of course is would any other architecture do better?

    I hope Intel won't start spinning PR BS about "this can't be done with a real system because it needs hardware access. Blah blah"

    Looks like once again the world learns that a system can be so simple there are no bugs in it or so complex there are no obvious bugs in it, which is something else.

  4. Anonymous Coward
    Anonymous Coward

    Containers

    Not much of a shock that containers could be affected by a flaw at this level, the security limitations of the model are well known.

    If you want your secrets isolated you don't use something like Docker.

  5. Anonymous Coward
    Anonymous Coward

    SGX will not fix your SW

    This is not the purpose of SGX. If your code is not resilient from side channel attacks, putting it into an enclave will obviously not solve it. Intel never claimed otherwise

    What this article shows is how the attack can be launched undetected in a non-compromised OS. Very interesting.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2020