VEIL: A Protected Services Framework for Confidential Virtual Machines

被引:2
|
作者
Ahmad, Adil [1 ]
Ou, Botong [2 ]
Liu, Congyu [2 ]
Zhang, Xiaokuan [3 ]
Fonseca, Pedro [2 ]
机构
[1] Arizona State Univ, Tempe, AZ 20006 USA
[2] Purdue Univ, W Lafayette, IN 47907 USA
[3] George Mason Univ, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
Confidential Virtual Machines; OS design; cloud security; ATTACKS; KERNEL;
D O I
10.1145/3623278.3624763
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Confidential virtual machines (CVMs) enabled by AMD SEV provide a protected environment for sensitive computations on an untrusted cloud. Unfortunately, CVMs are typically deployed with huge and vulnerable operating system kernels, exposing the CVMs to attacks that exploit kernel vulnerabilities. VEIL is a versatile CVM framework that efficiently protects critical system services like shielding sensitive programs, which cannot be entrusted to the buggy kernel. VEIL leverages a new hardware primitive, virtual machine privilege levels (VMPL), to install a privileged security monitor inside the CVM. We overcome several challenges in designing VEIL, including (a) creating unlimited secure domains with a limited number of VMPLs, (b) establishing resource-efficient domain switches, and (c) maintaining commodity kernel backwards-compatibility with only minor changes. Our evaluation shows that VEIL incurs no discernible performance slowdown during normal CVM execution while incurring a modest overhead (2 - 64%) when running its protected services across real-world use cases.
引用
收藏
页码:378 / 393
页数:16
相关论文
共 50 条
  • [31] IaaS cloud computing services for libraries: Cloud storage and virtual machines
    Han, Yan
    OCLC Systems and Services, 2013, 29 (02): : 87 - 100
  • [32] CONFIDENTIAL HEALTH-SERVICES FOR ADOLESCENTS
    COBLE, YD
    ESTES, EH
    HEAD, CA
    KARLAN, MS
    KENNEDY, WR
    NUMANN, PJ
    SCOTT, WC
    SKELTON, WD
    STEINHILBER, RM
    STRONG, JP
    TOEVS, CC
    WAGNER, HN
    LOEB, JM
    RINALDI, RC
    GANS, JE
    JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1993, 269 (11): : 1420 - 1424
  • [33] A HW/SW codesign framework based on distributed DSP virtual machines
    Kreiner, C
    Steger, C
    Teiniker, E
    Weiss, R
    EUROMICRO SYMPOSIUM ON DIGITAL SYSTEMS DESIGN, PROCEEDINGS, 2001, : 212 - 219
  • [34] A Hybrid Storage Access Framework for High-Performance Virtual Machines
    Kang, Chih-Kai
    Cai, Yu-Jhang
    Wu, Chin-Hsien
    Hsiu, Pi-Cheng
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2014, 13
  • [35] Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines
    Aissaoui-Mehrez, Hassane
    Urien, Pascal
    Pujolle, Guy
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 285 - 290
  • [36] Randomized MILP framework for Securing Virtual Machines from Malware Attacks
    Mangalagowri, R.
    Venkataraman, Revathi
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (02): : 1565 - 1580
  • [37] A Framework for Constructing Java']JavaScript Virtual Machines with Customized Datatype Representations
    Kataoka, Takafumi
    Ugawa, Tomoharu
    Iwasaki, Hideya
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1238 - 1247
  • [38] A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (03) : 854 - 867
  • [39] Fair auctioning and trading framework for cloud virtual machines based on blockchain
    Chen, Zhili
    Ding, Wei
    Xu, Yan
    Tian, Miaomiao
    Zhong, Hong
    COMPUTER COMMUNICATIONS, 2021, 171 : 89 - 98
  • [40] Virtual machines, virtual security?
    Bellovin, Steven M.
    COMMUNICATIONS OF THE ACM, 2006, 49 (10) : 104 - 104