TwinVisor: Hardware-isolated Confidential Virtual Machines for ARM

被引:21
|
作者
Li, Dingji [1 ,2 ,3 ]
Mi, Zeyu [1 ,3 ]
Xia, Yubin [1 ,3 ]
Zang, Binyu [1 ,3 ]
Chen, Haibo [1 ,3 ]
Guan, Haibing [4 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Parallel & Distributed Syst, Shanghai, Peoples R China
[2] Shanghai Jiao Tong Univ, AI Inst, MoE Key Lab Artificial Intelligence, Shanghai, Peoples R China
[3] Minist Educ, Engn Res Ctr Domain Specif Operating Syst, Beijing, Peoples R China
[4] Shanghai Jiao Tong Univ, Shanghai Key Lab Scalable Comp & Syst, Shanghai, Peoples R China
来源
PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, SOSP 2021 | 2021年
基金
中国国家自然科学基金;
关键词
Cloud Computing; Virtualization; Confidential Computing; ARM TrustZone; ENERGY EFFICIENCY; PERFORMANCE;
D O I
10.1145/3477132.3483554
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Confidential VM, which offers an isolated execution environment for cloud tenants with limited trust in the cloud provider, has recently been deployed in major clouds such as AWS and Azure. However, while ARM has become increasingly popular in cloud data centers, existing confidential VM designs mainly leverage specialized x86 hardware extensions (e.g., AMD SEV and Intel TDX) to isolate VMs upon a shared hypervisor. This paper proposes TwinVisor, the first system that enables the hardware-enforced isolation of confidential VMs on ARM platforms. TwinVisor takes advantage of the mature ARMTrustZone to run two isolated hypervisors, one in the secure world (called S-visor in this paper) and the other in the normal world (called N-visor), to support normal VMs and confidential VMs respectively. Instead of building a new S-visor from scratch, our design decouples protection from resource management, and reuses most functionalities of a full-fledged N-visor to minimize the size of S-visor. We have built two prototypes of TwinVisor: one on an official ARM simulator with S-EL2 enabled to validate functional correctness and the other on an ARM development board to evaluate performance. The S-visor comprises 5.8K LoCs while the N-visor introduces 906 LoC changes to KVM. According to our evaluation, TwinVisor can run unmodified VM images as confidential VMs while incurring less than 5% performance overhead for various real-world workloads on SMP VMs.
引用
收藏
页码:638 / 654
页数:17
相关论文
共 36 条
  • [1] Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels
    Lou, Xiaoxuan
    Chen, Kangjie
    Xu, Guowen
    Qiu, Han
    Guo, Shangwei
    Zhang, Tianwei
    2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN 2024, 2024, : 195 - 208
  • [2] Trustworthy confidential virtual machines for the masses
    Galanou, Anna
    Bindlish, Khushboo
    Preibsch, Luca
    Pignolet, Yvonne-Anne
    Fetzer, Christof
    Kapitza, Ruediger
    PROCEEDINGS OF THE 24TH ACM/IFIP INTERNATIONAL MIDDLEWARE CONFERENCE, MIDDLEWARE 2023, 2023, : 316 - 328
  • [3] HardWhale: A Hardware-isolated Network Security Enforcement System for Cloud Environments
    You, Myoungsung
    Nam, Jaehyun
    Seo, Hyunmin
    Seo, Minjae
    Kim, Jaehan
    Choi, Dongmin
    Shin, Seungwon
    2024 IEEE 44TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS 2024, 2024, : 496 - 507
  • [4] VEIL: A Protected Services Framework for Confidential Virtual Machines
    Ahmad, Adil
    Ou, Botong
    Liu, Congyu
    Zhang, Xiaokuan
    Fonseca, Pedro
    PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, ASPLOS 2023, VOL 4, 2023, : 378 - 393
  • [5] CHANGING VIRTUAL MACHINE ENVIRONMENT - INTERFACES TO REAL HARDWARE, VIRTUAL HARDWARE, AND OTHER VIRTUAL MACHINES
    MACKINNON, RA
    IBM SYSTEMS JOURNAL, 1979, 18 (01) : 18 - 46
  • [6] The Design and Optimization of Memory Ballooning in SEV Confidential Virtual Machines
    Deng, Chang
    Shen, Zheyun
    Dingji Li
    Mi, Zeyu
    Xia, Yubin
    2024 IEEE INTERNATIONAL CONFERENCE ON JOINT CLOUD COMPUTING, JCC, 2024, : 9 - 16
  • [7] DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines
    Ruan, Wenwen
    Wang, Wenhao
    Liu, Shuang
    Duan, Ran
    Yan, Shoumeng
    SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 23 - 41
  • [8] CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments
    Pecholt, Joana
    Wessel, Sascha
    PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 989 - 998
  • [9] HARDWARE ADDRESS TRANSLATION FOR MACHINES WITH A LARGE VIRTUAL MEMORY
    RAMAMOHANARAO, K
    SACKSDAVIS, R
    INFORMATION PROCESSING LETTERS, 1981, 13 (01) : 23 - 29
  • [10] Hardware/software co-design for virtual machines
    Kent, KB
    Serra, M
    Horspool, N
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2005, 152 (05): : 537 - 548