Cryptology ePrint Archive: Report 2017/048

ROTE: Rollback Protection for Trusted Execution

Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun

Abstract: Security architectures such as Intel SGX need protection against rollback attacks, where the adversary violates the integrity of a protected application state by replaying old persistently stored data or by starting multiple application instances. Successful rollback attacks have serious consequences on applications such as financial services. In this paper, we propose a new approach for rollback protection on SGX. The intuition behind our approach is simple. A single platform cannot efficiently prevent rollback, but in many practical scenarios, multiple processors can be enrolled to assist each other. We design and implement a rollback protection system called ROTE that realizes integrity protection as a distributed system. We construct a model that captures adversarial ability to schedule enclave execution and show that our solution achieves a strong security property: the only way to violate integrity is to reset all participating platforms to their initial state. We implement ROTE and demonstrate that distributed rollback protection can provide significantly better performance than previously known solutions based on local non-volatile memory.

Category / Keywords: SGX, Rollback protection, Distributed system, State protection, TEE, Trusted Execution

Original Publication (with minor differences): Usenix Security 2017

Date: received 21 Jan 2017, last revised 29 Jun 2017

Contact author: sinisa matetic at inf ethz ch

Available format(s): PDF | BibTeX Citation

Note: Paper update; 12.02.2017

Version: 20170629:153810 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]