Besides Intel's SGX technology, there are long-running discussions on how trusted computing technologies can be used to cloak malware. Past research showed example methods of malicious activities utilising Flicker, Trusted Platform Module, and recently integrating with enclaves. There is, however, an ambiguity over the core SGX ecosystem helps to cloak malware, or whether the additional engineering work outside SGX's ecosystem forcefully attaches (overfits) malware-behaviour into the enclave. We examine what malware aims to do in real-world scenarios and state-of-art techniques in malware evasion. The rising disadvantages of maintaining the malware and protecting it from anti-malware mechanisms make SGX enclaves a bad choice for achieving a successful malware campaign. We systematise twelve points outlining how an overfit-malware using SGX weakens malware's existing abilities. By making a comparison with a non-SGX malware (i.e., malware in the wild in our paper), we conclude that the use of hardware enclaves does not increase the preexisting attack surface, provides no new infection point, and does not contribute any new methods to the stealthiness of malware.
翻译:除了英特尔的SGX技术外,还有关于如何使用可信赖的计算机技术来掩盖恶意软件的长期讨论。过去的研究表明了使用Flicker、受信任平台模块和最近与飞地融合的恶意活动方法的例子。然而,对核心SGX生态系统的模糊性有助于掩盖恶意软件,或者在SGX生态系统外的附加工程工程工程是否强制将(过度)恶意软件行为(恶意软件)附加到飞地。我们研究了恶意软件在现实世界情景和恶意软件规避方面的最新技术中的目的是什么。维护恶意软件和保护其免受反恶意软件机制的日益不利之处使SGX飞地成为成功开展恶意软件运动的坏选择。我们系统化了12点,概述了使用SGX系统化软件超合适软件如何削弱恶意软件的现有能力。我们通过与非SGX恶意软件(即野生恶意软件)进行比较,我们得出结论,硬件飞地的使用不会增加攻击前的表面,没有提供新的感染方法,也没有帮助任何新的恶意软件。