TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments

被引:0
|
作者
Ghaniyoun, Moein [1 ]
Barber, Kristin [2 ]
Xiao, Yuan [3 ]
Zhang, Yinqian [4 ]
Teodorescu, Radu [1 ]
机构
[1] Ohio State Univ, Columbus, OH 43210 USA
[2] Google, Mountain View, CA 94043 USA
[3] Intel, Santa Clara, CA USA
[4] SUSTech, Shenzhen, Peoples R China
基金
美国国家科学基金会;
关键词
Security; Trusted Execution Environments; Verification; ARCHITECTURAL SUPPORT; CHANNEL ATTACKS; CACHE ATTACKS;
D O I
10.1145/3579371.3589070
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Trusted execution environments (TEE) are CPU hardware extensions that provide security guarantees for applications running on untrusted operating systems. The security of TEEs is threatened by a variety of microarchitectural vulnerabilities, which have led to a large number of demonstrated attacks. While various solutions for verifying the correctness and security of TEE designs have been proposed, they generally do not extend to jointly verifying the security of the underlying microarchitecture. This paper presents TEESec, the first pre-silicon framework for discovering microarchitectural vulnerabilities in the context of trusted execution environments. TEESec is designed to jointly and systematically test the TEE and underlying microarchitecture against data and metadata leakage across isolation boundaries. We implement TEESec in the Chipyard framework and evaluate it on two open-source RISC-V out-of-order processors running the Keystone TEE. Using TEESec we uncover 10 distinct vulnerabilities in these processors that violate TEE security principles and could lead to leakage of enclave secrets.
引用
收藏
页码:489 / 503
页数:15
相关论文
共 50 条
  • [1] INTROSPECTRE: A Pre-Silicon Framework for Discovery and Analysis of Transient Execution Vulnerabilities
    Ghaniyoun, Moein
    Barber, Kristin
    Zhang, Yinqian
    Teodorescu, Radu
    2021 ACM/IEEE 48TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2021), 2021, : 874 - 887
  • [2] Extended Abstract: Pre-Silicon Vulnerability Assessment for AI/ML Hardware
    Aydin, Furkan
    Karabulut, Emre
    Aysu, Aydin
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 495 - 495
  • [3] Pre-silicon Memory Validation
    Yih, Lim Kae
    Chun, Ch'ng Pei
    Yee, Lee Ching
    Mikhail, Moiseev
    Yin, Ngo Seow
    Chong, Ang Boon
    Beng, Koay Say
    2022 IEEE 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION ENGINEERING, ICECE, 2022, : 154 - 158
  • [4] Pre-Silicon Bug Forecast
    Guo, Qi
    Chen, Tianshi
    Chen, Yunji
    Wang, Rui
    Chen, Huanhuan
    Hu, Weiwu
    Chen, Guoliang
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (03) : 451 - 463
  • [5] Graviton: Trusted Execution Environments on GPUs
    Volos, Stavros
    Vaswani, Kapil
    Bruno, Rodrigo
    PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2018, : 681 - 696
  • [6] Building Open Trusted Execution Environments
    Kohlbrenner, David
    Shinde, Shweta
    Lee, Dayeol
    Asanovic, Krste
    Song, Dawn
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 47 - 56
  • [7] MultiTEE: Distributing Trusted Execution Environments
    Ott, Simon
    Orthen, Benjamin
    Weidinger, Alexander
    Horsch, Julian
    Nayani, Vijayanand
    Ekberg, Jan-Erik
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1617 - 1629
  • [8] Fuzzing trusted execution environments with Rust
    Blinowski, Grzegorz
    Szaknis, Michal
    COMPUTERS & SECURITY, 2025, 150
  • [9] A survey on the (in)security of trusted execution environments
    Munoz, Antonio
    Rios, Ruben
    Roman, Rodrigo
    Lopez, Javier
    COMPUTERS & SECURITY, 2023, 129
  • [10] Towards Modular Trusted Execution Environments
    Weinhold, Carsten
    Asmussen, Nils
    Goehringer, Diana
    Roitzsch, Michael
    PROCEEDINGS OF THE 2023 6TH WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION, SYSTEX 2023, 2023, : 10 - 16