TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Demystifying the Secure Enclave Processor [pdf]

124 pointsby taocpalmost 9 years ago

11 comments

unixheroalmost 9 years ago
Does anyone know where the Blackhat 2016 videos will be posted? I&#x27;ve always found them incredibly educational.<p>Okay I&#x27;ll leave something behind as well. This is my favorite sec-conference video of all time: [HOPE X] Elevator Hacking: From the Pit to the Penthouse <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=rOzrJjdZDRQ" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=rOzrJjdZDRQ</a> Closely followed by DEF CON 18 - Joseph McCray - You Spent All That Money and You Still Got Owned... <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=_SsUeWYoO1Y" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=_SsUeWYoO1Y</a>
评论 #12235619 未加载
评论 #12233373 未加载
PhantomGremlinalmost 9 years ago
The paper mentions standard methods of attack, such as glitching voltage and&#x2F;or clock.<p>Does anyone want to comment on how feasible it would be to defend against stuff like that in both hardware and software?<p>E.g. in software, instead of just storing an address in memory, store a tuple. Something like (address, ~address). Validate each tuple on use, i.e. (address ^ ~address) must result in all bits set. That&#x27;s obviously a naive thing, but there are probably similar relatively low overhead things that can be done.<p>Same with hardware. It wouldn&#x27;t be too difficult to store a parity bit to accompany each register byte. Any hardware glitching that flipped register bits would tend to result in parity errors. Parity checks are not very secure when considered individually, but collectively it would be very difficult to glitch the hardware without introducing massive numbers of parity errors.
评论 #12232503 未加载
zellynalmost 9 years ago
Am I understanding correctly that while they enumerate a list of potentially useful attack vectors, there are no actual attacks (yet)?<p>Of course, since the Year of Snowden, I now assume that any &quot;theoretical&quot; attack vector has a Team, a Project Manager, and a half-completed Kanban board somewhere deep in the NSA…
评论 #12233462 未加载
评论 #12233068 未加载
rdtscalmost 9 years ago
The military has been building these kinds of secure embedded processors for a long time, they usually include physical &#x2F; environmental protection packaging.<p>Wonder on the FIPS-140-2 level, where this chip would fit?<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;FIPS_140" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;FIPS_140</a>
kevincoxalmost 9 years ago
This seems like a lot of code to be running in a security-critical relatively simple device. Does anyone else have the impression that I would rather this device be much, much simpler.<p>Of course that might raise development costs but that seems like a fair trade off in this case, especially if it causes some &quot;features&quot; not to be implemented because they would be too hard.
评论 #12239569 未加载
joostersalmost 9 years ago
One day, a blackhat presentation is actually going to be a new PDF attack vector, and we&#x27;ll all be doomed.
评论 #12233219 未加载
评论 #12232698 未加载
vildaalmost 9 years ago
How feasible would it be to bombard the enclave with radiation, low enough to avoid any physical damage to the silicon, but high enough to cause random glitches in computation.
评论 #12241455 未加载
woumnalmost 9 years ago
If anyone is interested in a less technical, architecture overview of the Secure Enclave, I&#x27;ve written a blog series with the intent of reaching a more relaxed audience who is still concerned about their mobile security. The blog can be found here: <a href="https:&#x2F;&#x2F;woumn.wordpress.com&#x2F;2016&#x2F;05&#x2F;02&#x2F;security-principles-in-ios-architecture&#x2F;" rel="nofollow">https:&#x2F;&#x2F;woumn.wordpress.com&#x2F;2016&#x2F;05&#x2F;02&#x2F;security-principles-i...</a><p>I always welcome feedback! :^)
ddpalmost 9 years ago
Very nice design. I&#x27;m especially impressed they went with L4. For those who may not be aware, seL4 has been formally verified using COQ.
评论 #12271576 未加载
dr_zoidbergalmost 9 years ago
The best part of working in a digital forensics research lab is that I get to read this kind of presentations without having to say &quot;there goes my productivity for the day&quot;. Actually, whenever one of these comes around is when I get to be most productive :)
Sephiroth87almost 9 years ago
Is there a video of this?
评论 #12232374 未加载