A Hardware-Based Correct Execution Environment Supporting Virtual Memory

被引:0
|
作者
Lee, Daehyeon [1 ]
Shin, Ohsuk [1 ]
Cha, Yeonghyeon [1 ]
Lee, Junghee [1 ]
Yun, Taisic [2 ]
Kim, Jihye [3 ]
Oh, Hyunok [4 ]
Nicopoulos, Chrysostomos [5 ]
Lee, Sang Su [6 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
[2] Korea Adv Inst Sci & Technol, Grad Sch Informat Secur, Daejeon 34141, South Korea
[3] Kookmin Univ, Elect & Informat Syst Engn Major, Seoul 02707, South Korea
[4] Hanyang Univ, Dept Informat Syst, Seoul 04763, South Korea
[5] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
[6] ETRI, Cyber Secur Res Div, Daejeon 34129, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Operating systems; Hardware; Security; Memory management; Threat modeling; Servers; Data processing; Outsourcing; Cloud computing; Trusted computing; verifiable computation; isolation;
D O I
10.1109/ACCESS.2024.3443509
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid increase in data generation has led to outsourcing computation to cloud service providers, allowing clients to handle large tasks without investing resources. However, this brings up security concerns, and while there are solutions like fully homomorphic encryption and specific task-oriented methods, challenges in optimizing performance and enhancing security models remain for widespread industry adoption. Outsourcing computations to an untrusted remote computer can be risky, but attestation techniques and verifiable computation schemes aim to ensure the correct execution of outsourced computations. Nevertheless, the latter approach incurs significant overhead in generating a proof for the client. To minimize this overhead, the concept of a Correct Execution Environment (CEE) has been proposed (CEEv1), which omits proof generation for trusted parts of the prover. This paper proposes a new hardware-based CEE (CEEv2) that supports virtual memory and uses an inverted page table mechanism to detect, or prevent, illegal modifications to page mappings. The proposed mechanism supports virtual memory and thwarts virtual-to-physical mapping attacks, while minimizing software modifications. The paper also compares the proposed mechanism to other similar mechanisms used in AMD's SEV-SNP and Intel's SGX.
引用
收藏
页码:114008 / 114022
页数:15
相关论文
共 50 条
  • [21] A secure virtual execution environment for untrusted code
    Wen, Yan
    Wang, Huaimin
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 156 - 167
  • [22] Evaluating Energy-Efficiency of Hardware-based Security Mechanisms
    Haas, Christian
    Munz, Stephan
    Wilke, Joachim
    Hergenroeder, Anton
    2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 560 - 565
  • [23] Review of Virtual Memory Optimization in Cloud Environment
    Ding, Ye
    Xu, He
    Li, Peng
    Ding, Jie
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 53 - 58
  • [24] A Road Self-Guided Hardware-Based Demo System
    Lam Duc Khai
    Trinh Viet Hoang
    2021 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP 2021), 2021, : 156 - 161
  • [25] TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
    Bajaj, Sumeet
    Sion, Radu
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (03) : 752 - 765
  • [26] Hardware-based Probabilistic Threat Detection and Estimation for Embedded Systems
    Carreon, Nadir A.
    Lu, Sixing
    Lysecky, Roman
    2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2018, : 522 - 529
  • [27] Hardware-based Novel Authentication Scheme for Advanced Metering Infrastructure
    Nath, Atul Prasad Deb
    Amsaad, Fathi
    Choudhury, Muhtadi
    Niamat, Mohammed
    PROCEEDINGS OF THE 2016 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON) AND OHIO INNOVATION SUMMIT (OIS), 2016, : 364 - 371
  • [28] Investigation and Design of the Efficient Hardware-based RNG for Cryptographic Applications
    Razy, Ahmad Firdaus Mohamad
    Naziri, Siti Zarina Md
    Ismail, Rizalafande Che
    Idris, Norina
    2014 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2014, : 255 - 260
  • [29] A Multi-variant Execution Environment for Securing In-memory KVSes
    Enomoto, Shuhei
    Yamada, Hiroshi
    2022 18TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2022), 2022, : 9 - 16
  • [30] A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones
    Michailidis, Emmanouel T.
    Vouyioukas, Demosthenes
    DRONES, 2022, 6 (02)