Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate potential generic timing side channel defenses #171

Open
cr-tk opened this issue Nov 23, 2022 · 0 comments
Open

Investigate potential generic timing side channel defenses #171

cr-tk opened this issue Nov 23, 2022 · 0 comments
Labels
enhancement New feature or request

Comments

@cr-tk
Copy link
Collaborator

cr-tk commented Nov 23, 2022

Under some circumstances, an attacker near or on the enclave host system may hypothetically be able to leverage some observable timing behavior of QOS enclave responses to extract sensitive information from the enclave system.

This is a general attack concern and not about a single specific known scenario or bug.

The situation may also involve

  • crafted requests
  • unintended bugs in the QOS system code or Pivot App
    • specifically, non-constant time code
  • additional actions by the attacker to amplify the side channel, for example by putting load on either the host system or some other subsystem
  • repeated actions against the same or against different enclaves

We should investigate typical system timing behavior, for example the latency and jitter for host-to-enclave communication that are observed under various conditions, to understand the relevance and scale of this general attack topic.

A hypothetical and untested mitigation approach could involve adding some random, unpredictable and bounded amount of delay to the enclave operation before sending observable responses, which may help to reduce the visibility of any timing-related issues. However, please note that this is a limited (weak?) defense that requires a complicated tradeoff with performance costs.

This topic was discussed in an internal chat channel on 11/23/2022.

Relevant ticket: #73.

@cr-tk cr-tk added the enhancement New feature or request label Nov 23, 2022
@cr-tk cr-tk changed the title Investigate potential timing side channel defenses Investigate potential generic timing side channel defenses Nov 24, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant