Conference item
SoK: How not to architect your next-generation TEE malware?
- Abstract:
 - Besides Intel’s SGX technology, there are long-running discussions on how trusted computing technologies can be used to cloak malware. Past research showed example methods of malicious activities utilising Flicker, Trusted Platform Module, and recently integrating with enclaves. We observe two ambiguous methodologies of malware development being associated with SGX, and it is crucial to systematise their details. One methodology is to use the core SGX ecosystem to cloak malware; potentially affecting a large number of systems. The second methodology is to create a custom enclave not adhering to base assumptions of SGX, creating a demonstration code of malware behaviour with these incorrect assumptions; remaining local without any impact. We examine what malware aims to do in real-world scenarios and state-of-art techniques in malware evasion. We present multiple limitations of maintaining the SGX-assisted malware and evading it from anti-malware mechanisms. The limitations make SGX enclaves a poor choice for achieving a successful malware campaign. We systematise twelve misconceptions (myths) outlining how an overfit-malware using SGX weakens malware’s existing abilities. We find the differences by comparing SGX assistance for malware with non-SGX malware (i.e., malware in the wild in our paper). We conclude that the use of hardware enclaves does not increase the preexisting attack surface, enables no new infection vector, and does not contribute any new methods to the stealthiness of malware.
 
- Publication status:
 - Published
 
- Peer review status:
 - Peer reviewed
 
Actions
Access Document
- Files:
 - 
                
- 
                        
                        (Preview, Accepted manuscript, pdf, 561.8KB, Terms of use)
 
 - 
                        
                        
 
- Publisher copy:
 - 10.1145/3569562.3569568
 
Authors
- Publisher:
 - Association for Computing Machinery
 - Host title:
 - HASP '22: Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy
 - Pages:
 - 35–44
 - Publication date:
 - 2023-09-21
 - Acceptance date:
 - 2022-09-20
 - Event title:
 - Hardware and Architectural Support for Security and Privacy (HASP 2022)
 - Event location:
 - Chicago, Illinois, USA
 - Event website:
 - https://haspworkshop.org/2022/program.html
 - Event start date:
 - 2022-10-01
 - Event end date:
 - 2022-10-01
 - DOI:
 - ISBN:
 - 978-1-4503-9871-8
 
- Language:
 - 
                    English
 - Keywords:
 - Pubs id:
 - 
                  1282780
 - Local pid:
 - 
                    pubs:1282780
 - Deposit date:
 - 
                    2022-10-13
 
Terms of use
- Copyright holder:
 - Association for Computing Machinery
 - Copyright date:
 - 2022
 - Rights statement:
 - © 2022 Association for Computing Machinery
 - Notes:
 - This paper was presented at the Hardware and Architectural Support for Security and Privacy (HASP 2022). 1st October 2022, Chicago, Illinois, USA. This is the accepted manuscript version of the paper. The final version is available online from Association for Computing Machinery at https://doi.org/10.1145/3569562.3569568
 
If you are the owner of this record, you can report an update to it here: Report update to this record