A Hardware-Based Correct Execution Environment Supporting Virtual Memory

被引:0
作者
Lee, Daehyeon [1 ]
Shin, Ohsuk [1 ]
Cha, Yeonghyeon [1 ]
Lee, Junghee [1 ]
Yun, Taisic [2 ]
Kim, Jihye [3 ]
Oh, Hyunok [4 ]
Nicopoulos, Chrysostomos [5 ]
Lee, Sang Su [6 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
[2] Korea Adv Inst Sci & Technol, Grad Sch Informat Secur, Daejeon 34141, South Korea
[3] Kookmin Univ, Elect & Informat Syst Engn Major, Seoul 02707, South Korea
[4] Hanyang Univ, Dept Informat Syst, Seoul 04763, South Korea
[5] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
[6] ETRI, Cyber Secur Res Div, Daejeon 34129, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Operating systems; Hardware; Security; Memory management; Threat modeling; Servers; Data processing; Outsourcing; Cloud computing; Trusted computing; verifiable computation; isolation;
D O I
10.1109/ACCESS.2024.3443509
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid increase in data generation has led to outsourcing computation to cloud service providers, allowing clients to handle large tasks without investing resources. However, this brings up security concerns, and while there are solutions like fully homomorphic encryption and specific task-oriented methods, challenges in optimizing performance and enhancing security models remain for widespread industry adoption. Outsourcing computations to an untrusted remote computer can be risky, but attestation techniques and verifiable computation schemes aim to ensure the correct execution of outsourced computations. Nevertheless, the latter approach incurs significant overhead in generating a proof for the client. To minimize this overhead, the concept of a Correct Execution Environment (CEE) has been proposed (CEEv1), which omits proof generation for trusted parts of the prover. This paper proposes a new hardware-based CEE (CEEv2) that supports virtual memory and uses an inverted page table mechanism to detect, or prevent, illegal modifications to page mappings. The proposed mechanism supports virtual memory and thwarts virtual-to-physical mapping attacks, while minimizing software modifications. The paper also compares the proposed mechanism to other similar mechanisms used in AMD's SEV-SNP and Intel's SGX.
引用
收藏
页码:114008 / 114022
页数:15
相关论文
共 50 条
  • [31] Trusted Deployment of Virtual Execution Environment in Grid Systems
    Zou, Deqing
    Long, Jinjiu
    Jin, Hai
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2009: INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5913 : 124 - +
  • [32] Supporting Overcommitted Virtual Machines through Hardware Spin Detection
    Chakraborty, Koushik
    Wells, Philip M.
    Sohi, Gurindar S.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (02) : 353 - 366
  • [33] TEE: A Virtual DRTM Based Execution Environment for Secure Cloud-End Computing
    Dai, Weiqi
    Jin, Hai
    Zou, Deqing
    Xu, Shouhuai
    Zheng, Weide
    Shi, Lei
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 663 - 665
  • [34] TSC-VEE: A TrustZone-Based Smart Contract Virtual Execution Environment
    Jian, Zhaolong
    Lu, Ye
    Qiao, Youyang
    Fang, Yaozheng
    Xie, Xueshuo
    Yang, Dayi
    Zhou, Zhiyuan
    Li, Tao
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (06) : 1773 - 1788
  • [35] TEE: A virtual DRTM based execution environment for secure cloud-end computing
    Dai, Weiqi
    Jin, Hai
    Zou, Deqing
    Xu, Shouhuai
    Zheng, Weide
    Shi, Lei
    Yang, Laurence Tianruo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 : 47 - 57
  • [36] A Hardware-Based Architecture-Neutral Framework for Real-Time IoT Workload Forensics
    Zhou, Liwei
    Hu, Yang
    Makris, Yiorgos
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1668 - 1680
  • [37] Hardware-Based Linear Program Decoding With the Alternating Direction Method of Multipliers
    Wasson, Mitchell
    Milicevic, Mario
    Draper, Stark C.
    Gulak, Glenn
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (19) : 4976 - 4991
  • [38] The Hardware-Based PKCS#11 Standard using the RSA Algorithm
    Muzzi, F. A.
    Chiaramonte, R. B.
    Moreno, E. D.
    IEEE LATIN AMERICA TRANSACTIONS, 2009, 7 (02) : 160 - 169
  • [39] Technique for detecting hardware-based Trojans using a convolutional neural network
    Ravichandran, C.
    Nagalakshmi, T. J.
    Bharathi, P. Shyamala
    Sivakumaran, C.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (03) : 338 - 347
  • [40] Towards Trustworthy Data in Networked Control Systems: A Hardware-Based Approach
    Ulz, Thomas
    Pieber, Thomas
    Steger, Christian
    Matischek, Rainer
    Bock, Holger
    2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,