TEE-MR: Developer-friendly data oblivious programming for trusted execution environments

被引:0
|
作者
Alam, A. K. M. Mubashwir [1 ]
Chen, Keke [2 ]
机构
[1] Marquette Univ, Dept Comp Sci, Milwaukee, WI 53233 USA
[2] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
基金
美国国家科学基金会;
关键词
TEE; SGX; MapReduce; Data analytics; Dataflow; Access patterns; ORAM; CHANNEL ATTACKS;
D O I
10.1016/j.cose.2024.104119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trusted execution environments (TEEs) enable efficient protection of integrity and confidentiality for applications running on untrusted platforms. They have been deployed in cloud servers to attract users who have concerns on exporting data and computation. However, recent studies show that TEEs' side channels, including memory, cache, and micro-architectural features, are still vulnerable to adversarial exploitation. As many such attacks utilize program access patterns to infer secret information, data oblivious programs have been considered a practical defensive solution. However, they are often difficult to develop and optimize via either manual or automated approaches. We present the oblivious TEE with MapReduce (TEE-MR) approach that uses application frameworks, an approach between fully manual and fully automated, to hide the details of access-pattern protection to significantly minimize developers' efforts. We have implemented the approach with the MapReduce application framework for data-intensive applications. It can regulate application dataflows and hide application-agnostic access-pattern protection measures from developers. Compared to manual composition approaches, it demands much less effort for developers to identify access patterns and to write code. Our approach is also easy to implement, less complicated than fully automated approaches, for which we have not seen a working prototype yet. Our experimental results show that TEE-MR-based applications have good performance, comparable to those carefully developed with time-consuming manual composition approaches.
引用
收藏
页数:15
相关论文
共 20 条
  • [1] Demo: SGX-MR-Prot: Efficient and Developer-Friendly Access-Pattern Protection in Trusted Execution Environments
    Alam, A. K. M. Mubashwir
    Boyce, Justin
    Chen, Keke
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 1029 - 1032
  • [2] LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps
    Sun, Lizhi
    Wang, Shuocheng
    Wu, Hao
    Gong, Yuhang
    Xu, Fengyuan
    Liu, Yunxin
    Han, Hao
    Zhong, Sheng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (12) : 7138 - 7155
  • [3] TEE-Perf: A Profiler for Trusted Execution Environments
    Bailleu, Maurice
    Dragoti, Donald
    Bhatotia, Pramod
    Fetzer, Christof
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 414 - 421
  • [4] HasTEE: Programming Trusted Execution Environments with Haskell
    Sarkar, Abhiroop
    Krook, Robert
    Russo, Alejandro
    Claessen, Koen
    PROCEEDINGS OF THE 16TH ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON HASKELL, HASKELL 2023, 2023, : 72 - 88
  • [5] Oblivious Demand Paging with Ring ORAM in RISC-V Trusted Execution Environments
    Cai, Wenjing
    Zhu, Ziyuan
    Liu, Yuxin
    Zhang, Yusha
    Cheng, Xu
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1740 - 1745
  • [6] TEE-Time: A Dynamic Cache Timing Analysis Tool for Trusted Execution Environments
    Forcioli, Quentin
    Chaudhuri, Sumanta
    Danger, Jean-Luc
    2024 25TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED 2024, 2024,
  • [7] CHEX-MIX: Combining Homomorphic Encryption with Trusted Execution Environments for Oblivious Inference in the Cloud
    Natarajan, Deepika
    Loveless, Andrew
    Dai, Wei
    Dreslinski, Ronald
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 73 - 91
  • [8] TEE-KV: Secure Immutable Key-Value Store for Trusted Execution Environments
    Koshiba, Atsushi
    Yan, Ying
    Guo, Zhongxin
    Namiki, Mitaro
    Zhou, Lidong
    PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '18), 2018, : 535 - 535
  • [9] DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments
    Sebastian, D. Jonathan
    Agrawal, Utkarsh
    Tamimi, Ali
    Hahn, Adam
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) : 6476 - 6486
  • [10] Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments
    Ladjel, Riad
    Anciaux, Nicolas
    Pucheral, Philippe
    Scerri, Guillaume
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 381 - 388