back to article Intel's SGX security extensions: Secure until you look at the detail

A pair of cryptography researchers have published a graduate thesis that accuses Intel of ruining its “Software Guard Extensions” (SGX) with bad implementation decisions. Victor Costan and Srinivas Devadas of MIT criticize [PDF] the way SGX obtains cryptographic keys over the internet. Launched in 2013, SGX added CPU features …

  1. Warm Braw

    SGX patents

    "Patented" is a sure sign of "security" to avoid at all costs.

  2. Charles 9

    That said, the situation does appear to be an intractable problem of "Whom do you trust?" If a program can secure its own enclave, absolutely nothing will prevent a malware from doing the same thing, thus bunkering itself beyond hope of extrication. If you trust any other party (be it Intel or whatever), Trent gets a big fat target on his back.

    1. Paul Crawford Silver badge

      I trust myself - mostly - and not a corporation based in another jurisdiction.

      But it is less of a concern that malware could create its own protected world, so long as I can create my own protected worlds against malware without NSA Intel having the key to it, forcing an external network connection to establish it, or ultimately holding my business to ransom by virtue of this key holding.

      1. Anonymous Coward
        Pirate

        I took "Intel" to be the vernacular abbreviation of "intelligence" throughout that article. "Intelligence" in the sense of the I in CIA - not mental acuity - obviously.

        An ambiguity which every day is looking less like a coincidence and more like an in-joke.

      2. Charles 9

        The thing is that the malware could both create a protected world for itself AND hook onto those necessary inter-process parts of the legitimate processes (protected or not) and still be able to wreak havoc while simultaneously staying protected in its own little bunker. After all, no program is an island these days. Programs eventually need to get in touch with other programs (like a web browser contacting the TCP/IP stack), and these links can still be tapped.

      3. phil dude
        Unhappy

        trust...

        @Paul Crawford: +1.

        The only person you *can* trust is yourself, and even then that's not *always* best...

        However, it is not POSSIBLE to trust a corporation.

        They exist to make money, and the more market control they get, the less they see consumer complaints as anything other than inconsequential noise.

        P.

  3. Anonymous Coward
    Anonymous Coward

    Anybody out there want to do a helicopter-level comparison

    with ARM TrustZone, which appears to have similar goals, albeit ARM is historically associated with single-purpose systems where the SoC is specific to the target market (phones, set top boxes, etc) and hence has just one TrustZone, whereas new boy SGX has the potential for multiple enclaves in a system, as you might expect from a provider of multi-purpose chips where the system purpose is not known at chip design time.

    1. Charles 9

      Re: Anybody out there want to do a helicopter-level comparison

      That sounds more or less accurate. Whereas TrustZone is a binary "protected/unprotected" demarcation, SGX can have multiple protected enclaves, each exclusive to each other except where inter-process communication is necessary.

  4. Voland's right hand Silver badge

    Margrethe Vestager will have a field day

    I think Intel is has missed the elephant in the corner of the room. It also happens to be a hand-knitted elephant with a personal note attached to it. One signed by Margethe Vestager.

    Someone, pass the popcorn please.

  5. John Savard

    Not Likely That Bad

    The statement "being able to decide which software vendors are allowed to use SGX can effectively put Intel in a position to decide winners and losers in many software markets" suggests something which I think is highly unlikely to become reality.

    Instead, the reality will be sort of like the power ICANN wields; of course every business needs to have a URL for its web site, but everyone who can pay the money to register one will be accepted. That may still be an uncomfortable amount of power for Intel to have - but they would be very unlikely to attempt to pick and choose which businesses are allowed to use this for anticompetitive reasons.

    Probably, though, they would require customers for this to be "reputable" so that viruses couldn't be protected with SGX. Too high a bar for that could stifle software innovation. So there probably are some dangers - but we need to be looking in the right place for them.

  6. aberglas

    Protection from SGX Viruses

    SGX is the perfect place to write malicious code. I suspect Intel are trying to control who can write SGX enclaves to reduce that risk.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like