Score: 0

ShieldMMU: Detecting and Defending against Controlled-Channel Attacks in Shielding Memory System

Published: September 4, 2025 | arXiv ID: 2509.03879v1

By: Gang Liu, Ningjie Li, Cen Chen

Potential Business Impact:

Shields computer secrets from sneaky software attacks.

Business Areas:
Penetration Testing Information Technology, Privacy and Security

Intel SGX and hypervisors isolate non-privileged programs from other software, ensuring confidentiality and integrity. However, side-channel attacks continue to threaten Intel SGX's security, enabling malicious OS to manipulate PTE present bits, induce page faults, and steal memory access traces. Despite extensive research, existing defenses focus on detection or rely on impractical solutions. This paper presents ShieldMMU, a comprehensive solution for mitigating controlled channel attacks, balancing compatibility, performance, and usability. Leveraging a Merkle Tree-inspired Defense Tree (DD-Tree), ShieldMMU protects PTE integrity by detecting, locating, and restoring attacked PTEs. It identifies MMU page table lookup events and side-channel attacks, promptly restoring PTE parameters to prevent page fault traps and ensure secure non-privileged application operation within SGX. Our experiments confirm ShieldMMU's enhanced security and acceptable latency performance.

Country of Origin
🇨🇳 China

Page Count
13 pages

Category
Computer Science:
Cryptography and Security