- Published on
SGX Attacker
SGX Attacker
Title: SGX Attacker
Author: zTgx
Subject: Security Research and SGX Vulnerability Exploration
Language: Makefile (77.3%), C++ (12.3%), Shell (7%), C (3.4%)
Source: GitHub Repository
Introduction
SGX Attacker is a project aimed at understanding and testing the security boundaries of Intel's Software Guard Extensions (SGX). It provides a hands-on approach to simulating attacks and manipulating untrusted values within an SGX environment.
Key Features
- Simulation of SGX Vulnerabilities: Simulates potential attack scenarios on SGX-protected applications.
- Interactive Value Manipulation: Uses tools like
scanmem
to identify and modify untrusted values in real-time. - Terminal-based Workflow: Step-by-step instructions for running and testing in a terminal environment.
Workflow
- Build and Run in Terminal A:
- Use
SGX_MODE=SW make
to build the application. - Execute the application with
./app
.
- Use
- Monitor in Terminal B:
- Identify the application process with
ps aux | grep app
. - Attach
scanmem
to the process ID and explore untrusted values.
- Identify the application process with
- Manipulate Values:
- Modify untrusted values using
scanmem
commands, such asset
.
- Modify untrusted values using
Get Started
Follow the detailed instructions in the repository's README to set up and run the project. Explore the GitHub Repository for more details and contribute to the research on SGX security.
THE END