Intel® Software Guard Extensions (Intel® SGX)
Discussion board focused on hardware-based isolation and memory encryption to provide extended code protection in solutions.

Intra-Platform Attestation

AB_
Beginner
846 Views

Hi,

Reading from the https://software.intel.com/en-us/articles/innovative-technology-for-cpu-based-attestation-and-sealing, Section 3.1 Intra-Platform Attestation, Figure 3,  in step 2, if application A behaves adversely and launches a replay attack by sending a previously (i.e., say launched at some point in history) valid report of Enclave A, can Enclave B still attest that report? If not, what prevents it from successfully attesting it?

Anitha

0 Kudos
5 Replies
Prabu_R_Intel
Employee
846 Views

If the Enclave A performs replay attack with the old report that was launched at some point in history, there is a chance for Enclave B
to successfully auntheticate Enclave A's report.

case 1: After generating old report, if there was any change in TCB, Enclave B fails to authenticate.It's because the Enclave B may consider that report generated by Enclave A might be old or not from valid TCB.

case 2 : After the generation of report, there is no change in TCB of the platform, then Enclave B can authenticate successfully.
But even in this case, the secret information like keys can't be leaked to malware application.Here report authentication happens within
enclave(trusted zone).So there is no chance of accomplising the benefit of replay attack.

0 Kudos
AB_
Beginner
846 Views

Prabu Rajathirumoni wrote:

case 1: After generating old report, if there was any change in TCB, Enclave B fails to authenticate.It's because the Enclave B may consider that report generated by Enclave A might be old or not from valid TCB.

What parts are counted as TCB here?

Prabu Rajathirumoni wrote:

case 2 : After the generation of report, there is no change in TCB of the platform, then Enclave B can authenticate successfully.
But even in this case, the secret information like keys can't be leaked to malware application.Here report authentication happens within
enclave(trusted zone).So there is no chance of accomplising the benefit of replay attack.



Sure signing keys cannot be leaked. But I am thinking of a scenario where Enclave A has been corrupted and the malicious application A would like to get Quoting Enclave (say Enclave B) to attest the report of Enclave A.  Now application A might be able to launch replay attack and get Enclave B to sign an old valid report of A. This may have  some implications in the remote attestation where the ISV can now be fooled into thinking that Enclave A might be running right software.

Thanks
 

0 Kudos
Prabu_R_Intel
Employee
846 Views

What parts are counted as TCB here?

TCB stands for Trusted Computing Base. It corresponds to the software and hardware component that helps to build the protected region.

 

0 Kudos
AB_
Beginner
846 Views

Prabu Rajathirumoni wrote:

What parts are counted as TCB here?

TCB stands for Trusted Computing Base. It corresponds to the software and hardware component that helps to build the protected region.



Sure, I meant to ask what exactly counts as TCB. Perhaps I will be more explicit. Suppose an enclave A was launched with program p (binary) at some point, say yesterday. If I launch an enclave today with the same program p (same binary as well), on the same machine, and say there is a change in TCB. Since I am using the same hardware, what exactly does attribute to the change in the TCB?

0 Kudos
Prabu_R_Intel
Employee
846 Views

Even though the same binary and same hardware are used at different point of time in the same system, there is a chance of change in other TCB components like BIOS version, run time component provided by PSW package.

0 Kudos
Reply