Published on

SGX Attacker

SGX Attacker

Title: SGX Attacker

Author: zTgx

Subject: Security Research and SGX Vulnerability Exploration

Language: Makefile (77.3%), C++ (12.3%), Shell (7%), C (3.4%)

Source: GitHub Repository

Introduction

SGX Attacker is a project aimed at understanding and testing the security boundaries of Intel's Software Guard Extensions (SGX). It provides a hands-on approach to simulating attacks and manipulating untrusted values within an SGX environment.

Key Features

  • Simulation of SGX Vulnerabilities: Simulates potential attack scenarios on SGX-protected applications.
  • Interactive Value Manipulation: Uses tools like scanmem to identify and modify untrusted values in real-time.
  • Terminal-based Workflow: Step-by-step instructions for running and testing in a terminal environment.

Workflow

  1. Build and Run in Terminal A:
    • Use SGX_MODE=SW make to build the application.
    • Execute the application with ./app.
  2. Monitor in Terminal B:
    • Identify the application process with ps aux | grep app.
    • Attach scanmem to the process ID and explore untrusted values.
  3. Manipulate Values:
    • Modify untrusted values using scanmem commands, such as set.

Get Started

Follow the detailed instructions in the repository's README to set up and run the project. Explore the GitHub Repository for more details and contribute to the research on SGX security.


THE END