Supporting Trusted Virtual Machines with Hardware-Based Secure Remote Memory

被引:0
作者
Heo, Taekyung [1 ]
Kang, Seunghyo [2 ]
Lee, Sanghyeon [2 ]
Hwang, Soojin [2 ]
Park, Joongun [3 ]
Huh, Jaehyuk [2 ]
机构
[1] NVIDIA, Santa Clara, CA 95051 USA
[2] Korea Adv Inst Sci & Technol, Daejeon, South Korea
[3] Georgia Inst Technol, Atlanta, GA USA
来源
PROCEEDINGS OF THE 2024 ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON MEMORY MANAGEMENT, ISMM 2024 | 2024年
基金
新加坡国家研究基金会;
关键词
disaggregated memory; trusted computing; memory protection; ATTACKS;
D O I
10.1145/3652024.3665509
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although recent studies have been improving the performance of RDMA-based memory disaggregation systems, their security aspect has not been thoroughly investigated. For secure disaggregated memory, the memory-providing node must protect its memory from memory-requesting nodes, and the memory-requesting node requires the confidentiality and integrity protection of its memory contents in the remote node, even when the privileged software is compromised. To provide protection of remote memory, this study proposes a hardware-assisted memory disaggregation system. The proposed trusted disaggregated memory combines the current trusted hardware-based virtual machine (VM) and a new dedicated hardware engine for trusted memory disaggregation. The processor with supports for trusted VM protects the context of a user VM within the local system, while the proposed hardware engine provides an efficient isolation and protection of remote memory pages, guaranteeing the confidentiality and integrity of remote memory pages. In the secure memory disaggregation system, fast address translation and access validation are supported with the cooperation of the hardware engine and guest OS in a trusted virtual machine. In addition, the proposed system hides the memory access patterns observable from remote nodes, supporting obliviousness. Our evaluation with an FPGA-based prototype implementation shows that such fine-grained secure disaggregated memory is feasible with comparable performance to the latest software-based technique without security support.
引用
收藏
页码:43 / 56
页数:14
相关论文
共 44 条
[1]  
Aga S, 2017, 44TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2017), P94, DOI [10.1145/3140659.3080232, 10.1145/3079856.3080232]
[2]  
Al Maruf Hasan, 2023, P 28 ACM INT C ARCH, V3
[3]   Can Far Memory Improve Job Throughput? [J].
Amaro, Emmanuel ;
Branner-Augmon, Christopher ;
Luo, Zhihong ;
Ousterhout, Amy ;
Aguilera, Marcos K. ;
Panda, Aurojit ;
Ratnasamy, Sylvia ;
Shenker, Scott .
PROCEEDINGS OF THE FIFTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS'20), 2020,
[4]  
AMD, 2021, QDMA Subsystem for PCI Express
[5]  
AMD, 2021, UltraScale+ Integrated 100G Ethernet Subsystem
[6]  
Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689
[7]   Shielding Applications from an Untrusted Cloud with Haven [J].
Baumann, Andrew ;
Peinado, Marcus ;
Hunt, Galen .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2015, 33 (03)
[8]   Rethinking Software Runtimes for Disaggregated Memory [J].
Calciu, Irina ;
Imran, M. Talha ;
Puddu, Ivan ;
Kashyap, Sanidhya ;
Al Maruf, Hasan ;
Mutlu, Onur ;
Kolli, Aasheesh .
ASPLOS XXVI: TWENTY-SIXTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, 2021, :79-92
[9]   Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs [J].
Chan, T-H Hubert ;
Shi, Elaine .
THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 :72-107
[10]  
Cheng PC, 2023, Arxiv, DOI arXiv:2303.15540