论文标题
Blime:通过硬件增强的污点跟踪可验证安全外包计算
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
论文作者
论文摘要
当今外包计算已被广泛使用。但是,当前在外包计算中保护客户数据的方法很短:使用诸如完全塑形加密之类的加密技术会带来大量成本,而使用硬件辅助可信的执行环境则显示出容易受到运行时和侧向通道攻击的影响。 我们提出了盲目的内存(Blime),这是一种实现高效且安全的外包计算的体系结构。 Blime由一套新颖而最小的指令集架构(ISA)扩展组成,该扩展即使在存在服务器漏洞的情况下,也可以确保客户数据的机密性。为了确保外包计算,Blime扩展可以与可证明的,固定功能的硬件安全模块(HSM)一起使用,以及提供原子解密和加密和加密和非处方操作的加密引擎。客户依靠与HSM的远程证明和关键协议,以确保可以将其数据安全转移到加密引擎,并将始终受到服务器上Blime的污点策略的保护。 我们根据动臂RISC-V核心提供RTL实现Blime-Boom。 Blime-Boom相对于未修改的动臂不需要降低时钟频率,并且具有最小的功率($ <\!1.5 \%$)和FPGA资源($ \ leq \!9.0 \%$)开销。 Blime的各种实现仅产生适度的性能开销($ 8--25 \%$)。我们还提供了带有Blime扩展名的简化模型ISA的机器检查的安全证明。
Outsourced computing is widely used today. However, current approaches for protecting client data in outsourced computing fall short: use of cryptographic techniques like fully-homomorphic encryption incurs substantial costs, whereas use of hardware-assisted trusted execution environments has been shown to be vulnerable to run-time and side-channel attacks. We present Blinded Memory (BliMe), an architecture to realize efficient and secure outsourced computation. BliMe consists of a novel and minimal set of instruction set architecture (ISA) extensions implementing a taint-tracking policy to ensure the confidentiality of client data even in the presence of server vulnerabilities. To secure outsourced computation, the BliMe extensions can be used together with an attestable, fixed-function hardware security module (HSM) and an encryption engine that provides atomic decrypt-and-taint and encrypt-and-untaint operations. Clients rely on remote attestation and key agreement with the HSM to ensure that their data can be transferred securely to and from the encryption engine and will always be protected by BliMe's taint-tracking policy while at the server. We provide an RTL implementation BliMe-BOOM based on the BOOM RISC-V core. BliMe-BOOM requires no reduction in clock frequency relative to unmodified BOOM, and has minimal power ($<\!1.5\%$) and FPGA resource ($\leq\!9.0\%$) overheads. Various implementations of BliMe incur only moderate performance overhead ($8--25\%$). We also provide a machine-checked security proof of a simplified model ISA with BliMe extensions.