Physical Attacks on Secure Enclaves: A Growing Concern
The security of Trusted Execution Environments (TEEs) has been called into question by recent research, which has demonstrated the vulnerability of these secure enclaves to physical attacks. Despite claims by organizations such as Intel and AMD that physical access is out of scope, security experts like Moore, with over three decades of experience, argue that physical access is, in fact, the entire point of TEEs.
In an effort to provide assurances, many organizations have made statements that are confusing, misleading, or false. For instance, some claim that their implementations are secure, while others acknowledge that their TEEs can be compromised. Meta, for example, stated that their WhatsApp implementation of SEV-SNP uses additional protections that would block TEE.fail attackers from impersonating their servers. However, the company did not dispute that TEE.fail could still extract secrets from the AMD TEE.
Understanding the Risks of Deterministic Encryption
The Cloudflare theft protection relies on SME, the engine driving SEV-SNP encryption, which uses deterministic encryption. This cryptographic property is the root cause of the failure of the three TEEs. Deterministic encryption, while efficient, can be vulnerable to attacks that exploit its predictability. The researchers did not directly test SME against TEE.fail, but the use of deterministic encryption raises concerns about the security of Cloudflare’s theft protection.
Cloud Providers and Physical Attacks
Many TEE users run their infrastructure inside cloud providers such as AWS, Azure, or Google, where protections against supply-chain and physical attacks are robust. However, this does not necessarily mean that TEEs are secure. There is little discussion about the growing viability of cheap, physical attacks, and no evidence that implementations not vulnerable to the three attacks won’t fall to follow-on research. Moreover, parties relying on TEEs often have no way of knowing where their servers are running and whether they are free from physical compromise.
In conclusion, the security of TEEs is a complex issue, and organizations must be aware of the potential risks and limitations of these secure enclaves. While some may claim that their implementations are secure, the reality is that physical attacks are a growing concern. For more information on this topic, read the full article Here.
Image Credit: arstechnica.com