A Hardware-Based Correct Execution Environment Supporting Virtual Memory

被引:0
|
作者
Lee, Daehyeon [1 ]
Shin, Ohsuk [1 ]
Cha, Yeonghyeon [1 ]
Lee, Junghee [1 ]
Yun, Taisic [2 ]
Kim, Jihye [3 ]
Oh, Hyunok [4 ]
Nicopoulos, Chrysostomos [5 ]
Lee, Sang Su [6 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
[2] Korea Adv Inst Sci & Technol, Grad Sch Informat Secur, Daejeon 34141, South Korea
[3] Kookmin Univ, Elect & Informat Syst Engn Major, Seoul 02707, South Korea
[4] Hanyang Univ, Dept Informat Syst, Seoul 04763, South Korea
[5] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
[6] ETRI, Cyber Secur Res Div, Daejeon 34129, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Operating systems; Hardware; Security; Memory management; Threat modeling; Servers; Data processing; Outsourcing; Cloud computing; Trusted computing; verifiable computation; isolation;
D O I
10.1109/ACCESS.2024.3443509
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid increase in data generation has led to outsourcing computation to cloud service providers, allowing clients to handle large tasks without investing resources. However, this brings up security concerns, and while there are solutions like fully homomorphic encryption and specific task-oriented methods, challenges in optimizing performance and enhancing security models remain for widespread industry adoption. Outsourcing computations to an untrusted remote computer can be risky, but attestation techniques and verifiable computation schemes aim to ensure the correct execution of outsourced computations. Nevertheless, the latter approach incurs significant overhead in generating a proof for the client. To minimize this overhead, the concept of a Correct Execution Environment (CEE) has been proposed (CEEv1), which omits proof generation for trusted parts of the prover. This paper proposes a new hardware-based CEE (CEEv2) that supports virtual memory and uses an inverted page table mechanism to detect, or prevent, illegal modifications to page mappings. The proposed mechanism supports virtual memory and thwarts virtual-to-physical mapping attacks, while minimizing software modifications. The paper also compares the proposed mechanism to other similar mechanisms used in AMD's SEV-SNP and Intel's SGX.
引用
收藏
页码:114008 / 114022
页数:15
相关论文
共 50 条
  • [1] Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment
    Lee, Junghee
    Nicopoulos, Chrysostomos
    Jeong, Gweonho
    Kim, Jihye
    Oh, Hyunok
    IEEE ACCESS, 2020, 8 : 216689 - 216706
  • [2] Supporting Trusted Virtual Machines with Hardware-Based Secure Remote Memory
    Heo, Taekyung
    Kang, Seunghyo
    Lee, Sanghyeon
    Hwang, Soojin
    Park, Joongun
    Huh, Jaehyuk
    PROCEEDINGS OF THE 2024 ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON MEMORY MANAGEMENT, ISMM 2024, 2024, : 43 - 56
  • [3] Hardware-based Always-On Heap Memory Safety
    Kim, Yonghae
    Lee, Jaekyu
    Kim, Hyesoon
    2020 53RD ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO 2020), 2020, : 1153 - 1166
  • [4] Security Primitives for Reconfigurable Hardware-Based Systems
    Huffmire, Ted
    Levin, Timothy
    Thuy Nguyen
    Irvine, Cynthia
    Brotherton, Brett
    Wang, Gang
    Sherwood, Timothy
    Kastner, Ryan
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2010, 3 (02)
  • [5] Quick Boot of Trusted Execution Environment With Hardware Accelerators
    Trong-Thuc Hoang
    Duran, Ckristian
    Duc-Thinh Nguyen-Hoang
    Duc-Hung Le
    Tsukamoto, Akira
    Suzaki, Kuniyasu
    Cong-Kha Pham
    IEEE ACCESS, 2020, 8 : 74015 - 74023
  • [6] Hardware-Based Trusted Computing Architectures for Isolation and Attestation
    Maene, Pieter
    Gotzfried, Johannes
    de Clercq, Ruan
    Mueller, Tilo
    Freiling, Felix
    Verbauwhede, Ingrid
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (03) : 361 - 374
  • [7] A Case for Hardware-Based Demand Paging
    Lee, Gyusun
    Jin, Wenjing
    Song, Wonsuk
    Gong, Jeonghun
    Bae, Jonghyun
    Ham, Tae Jun
    Lee, Jae W.
    Jeong, Jinkyu
    2020 ACM/IEEE 47TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2020), 2020, : 1103 - 1116
  • [8] Gamifying the Project in Hardware-based Courses
    Ristov, Sasko
    Ackovska, Nevena
    Kirandziska, Vesna
    INTERNATIONAL JOURNAL OF ENGINEERING PEDAGOGY, 2015, 5 (04): : 4 - 11
  • [9] Evaluating the Impact of Hardware Faults on Program Execution in a Microkernel Environment
    Bekele, Yohannes B.
    Limbrick, Daniel B.
    2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 149 - 152
  • [10] Hardware-Based Fast Hybrid Morphological Reconstruction
    Anacona-Mosquera, Oscar
    dos Santos, Carlos Eduardo
    Cabral, Felipe R. G.
    Sampaio, Renato C.
    Teodoro, George
    Jacobi, Ricardo Pezzuol
    Llanos, Carlos Humberto
    IEEE DESIGN & TEST, 2020, 37 (03) : 30 - 39