A group of experts published their research on this attack
Network security and ethical hacking specialists from the International Institute of Cyber Security report the emergence of the first functional malware for Intel Software Guard Extensions (Intel SGX). The research expert group believes that the vulnerabilities present in SGX, a feature designed to reinforce Intel’s security, could generate countless damage, as this allows hackers to deploy very advanced malware variants.
According to its official website, Intel SGX is “an extension of architecture developed to improve the security of the data and the application code”. Michael Schwarz, Daniel Gruss and Samuel Weiser, specialists in network security, discovered a way to hide malware in the SGX enclaves of Intel.
The experts used a technique known as return-oriented programming (ROP) to design their own application and perform various malicious activities, such as randomization of the address space design at operating system level or executing arbitrary code to extract confidential information.
Researchers have shown that enclaves can escape their SGX execution environment and omit any communication interface prescribed by their host. Previously it was thought that enclaves, and anything operating within them, were limited to access to parts of the operating system that did not interact with the enclaves; this team of experts has shown that the hypothesis was wrong.
To perform the attack, experts resorted to the use of the Transactional Synchronization Extensions (TSX) function, available on the most recent devices, so they managed to analyze the system memory in search of a virtual address to which could access the current process. According to specialists in network security, this intrusion is not detectable, because applications at the operating system level cannot take a look at the enclave.
Research managers consider this information to be useful in developing solutions for the next generation of computer equipment. In addition, some security measures against these attack vectors may not necessarily require software modifications, although their implementation may have some impact on equipment performance.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.