CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms

被引:1
作者
Wang, Jie [1 ,2 ]
Sun, Kun [2 ]
Lei, Lingguang [3 ]
Wang, Yuewu [4 ]
Jing, Jiwu [4 ]
Wan, Shengye [5 ]
Li, Qi [6 ,7 ]
机构
[1] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Hubei Key Lab Distributed Syst Secur, Wuhan 430074, Peoples R China
[2] George Mason Univ, Dept Informat Sci & Technol, Fairfax, VA 22030 USA
[3] Chinese Acad Sci, Inst Informat Engn, SKLOIS, Beijing 100045, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cryptog, Beijing 101408, Peoples R China
[5] Coll William & Mary, Williamsburg, VA 23185 USA
[6] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100190, Peoples R China
[7] Beijing Natl Res Ctr Informat Sci & Technol, Beijing 100190, Peoples R China
基金
美国国家科学基金会;
关键词
Security; Program processors; Monitoring; Codes; Hardware; Random access memory; Prototypes; TrustZone; isolated execution environment; cache-assisted; ATTACKS;
D O I
10.1109/TDSC.2023.3251418
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
ARM TrustZone technology has been widely used to create Trusted Execution Environments (TEEs) for enhancing the security of applications. However, the increasing number of installed security-sensitive applications in the secure world will inevitably enlarge the trusted computing base (TCB) of TEE systems. To minimize the TCB of the secure world and increase application portability, Isolated Execution Environments (IEEs) are proposed to protect applications in enclaves created in the normal world. However, existing IEE systems cannot provide the same level of security as the TEE systems, particularly, on resolving the multi-vector attacks that include both physical memory disclosure attacks and software attacks. In this article, we develop a new cache-assisted IEE system called CacheIEE that creates enclaves in the L1 data cache of the normal world to protect sensitive data against multi-vector attacks. First, by always storing the sensitive data in the L1 data cache, CacheIEE can effectively prevent physical memory disclosure attacks. Second, we protect the L1 data cache against untrusted rich OS running in other cores. To support more applications, CacheIEE can process large-size sensitive data in the L1 data cache with constrained capacity. We implement a system prototype of CacheIEE and verify its security and practicability.
引用
收藏
页码:254 / 269
页数:16
相关论文
共 63 条
[1]  
Alves Tiago., 2004, ARM White Paper, V3
[2]  
[Anonymous], 2014, OP-TEE: Open portable trusted execution environment
[3]  
[Anonymous], 2016, ARM Cortex-A9 processor technical reference manual
[4]  
[Anonymous], 2010, TrustZone address space controller (TZC-380) technical reference manual
[5]  
[Anonymous], 2019, Arm architecture reference manual
[6]  
[Anonymous], 2022, wpa_supplicant
[7]  
[Anonymous], 2010, ARM Cortex-A8 processor technical reference manual
[8]  
[Anonymous], 2022, AMD secure encrypted virtualization (SEV)
[9]  
[Anonymous], 2010, RFC5869
[10]  
[Anonymous], 2015, ChaCha20 and Poly1305 for IETF protocols