论文标题

CURE:具有可自定义和弹性飞地的安全体系结构

CURE: A Security Architecture with CUstomizable and Resilient Enclaves

论文作者

Bahmani, Raad, Brasser, Ferdinand, Dessouky, Ghada, Jauernig, Patrick, Klimmek, Matthias, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

论文摘要

提供可信赖的执行环境(TEE)的安全体系结构是广泛的计算机系统的吸引力研究主题,从低端嵌入式设备到强大的云服务器。这些架构的目的是在孤立的执行环境中保护敏感服务,称为飞地。不幸的是,现有的TEE解决方案遭受了重大的设计缺点。首先,他们遵循一种千篇一律的方法,仅提供单个飞地类型,但是,不同的服务需要灵活的飞地,可以适应其需求。其次,他们无法有效地支持新兴应用程序(例如机器学习作为服务),该应用程序需要安全的渠道到外围设备(例如,加速器)或多个内核的计算能力。第三,他们对缓存侧通道攻击的保护要么是事后的想法或不切实际,即在缓存资源和单个飞地之间没有细粒度的映射。 在这项工作中,我们提出了治愈方法,这是第一个安全体系结构,它通过提供不同类型的空地来应对这些设计挑战:(i)子空间空间在所有执行特权级别上提供垂直隔离级别,(ii)用户空间空间空间为隔离的应用程序提供了隔离的执行,并允许(iii)自centerge的private fivere clive fiver fiverecents foreferge forepent forperge respend forter coppen。此外,CURE可以将系统资源的独家分配,例如外围设备,CPU内核或缓存资源到单个飞地。 CURE需要最小的硬件变化,同时显着改善了硬件辅助安全体系结构的艺术状态。我们在基于RISC-V的SOC上实施了治愈方法,并在硬件和性能开销方面对我们的原型进行了彻底评估。 CURE在标准基准上施加了15.33%的几何平均性能开销。

Security architectures providing Trusted Execution Environments (TEEs) have been an appealing research subject for a wide range of computer systems, from low-end embedded devices to powerful cloud servers. The goal of these architectures is to protect sensitive services in isolated execution contexts, called enclaves. Unfortunately, existing TEE solutions suffer from significant design shortcomings. First, they follow a one-size-fits-all approach offering only a single enclave type, however, different services need flexible enclaves that can adjust to their demands. Second, they cannot efficiently support emerging applications (e.g., Machine Learning as a Service), which require secure channels to peripherals (e.g., accelerators), or the computational power of multiple cores. Third, their protection against cache side-channel attacks is either an afterthought or impractical, i.e., no fine-grained mapping between cache resources and individual enclaves is provided. In this work, we propose CURE, the first security architecture, which tackles these design challenges by providing different types of enclaves: (i) sub-space enclaves provide vertical isolation at all execution privilege levels, (ii) user-space enclaves provide isolated execution to unprivileged applications, and (iii) self-contained enclaves allow isolated execution environments that span multiple privilege levels. Moreover, CURE enables the exclusive assignment of system resources, e.g., peripherals, CPU cores, or cache resources to single enclaves. CURE requires minimal hardware changes while significantly improving the state of the art of hardware-assisted security architectures. We implemented CURE on a RISC-V-based SoC and thoroughly evaluated our prototype in terms of hardware and performance overhead. CURE imposes a geometric mean performance overhead of 15.33% on standard benchmarks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源