SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE

被引:48
作者
Zhao, Shijun [1 ]
Zhang, Qianying [2 ]
Qin, Yu [1 ]
Feng, Wei [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Beijing, Peoples R China
[2] Capital Normal Univ, Coll Informat Engn, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) | 2019年
基金
中国国家自然科学基金;
关键词
Secure enclave; TEE; ARM TrustZone; Board-level physical attacks; Memory access based side-channel attacks; SIDE-CHANNEL ATTACKS; COUNTERMEASURES;
D O I
10.1145/3319535.3363205
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure enclaves provide a practical solution to secure computation, and current approaches to secure enclaves are implemented by extending hardware security mechanisms to the CPU architecture. Therefore, it is hard for a platform to offer secure computation if its CPU architecture is not equipped with any secure enclave features. Unfortunately, ARM CPUs, dominating mobile devices and having increasing momentum in cloud markets, do not provide any security mechanisms achieving the security equivalent to modern secure enclave architectures. In this paper, we propose SecTEE, a software based secure enclave architecture which is based on the CPU's isolation mechanism and does not require specialized security hardware of the CPU architecture such as memory encryption engines. SecTEE achieves a high level of security even compared with hardware-based secure enclave architectures: resistance to privileged host software attacks, lightweight physical attacks, and memory access based side-channel attacks. Besides, SecTEE provides rich trusted computing primitives for enclaves: integrity measurement, remote attestation, data sealing, secrets provisioning, and life cycle management. We implement a SecTEE prototype based on the ARM TrustZone technology, but our approach can be applied to other CPU architectures with isolation mechanisms. The evaluation results show that most overhead comes from the software encryption and the runtime overhead imposed by trusted computing primitives is acceptable.
引用
收藏
页码:1723 / 1740
页数:18
相关论文
共 124 条
[1]  
Almoallem YD, 2017, INT CONF OPTIC MEMS, P69
[2]  
AMD64 Virtualization, 2005, AMD PUBLICATION
[3]  
[Anonymous], 2013, ACM Conference on Computer and Communications Security CCS
[4]  
[Anonymous], 2013, P ACSAC 2013 NEW ORL
[5]  
[Anonymous], 2013, LNCS, DOI DOI 10.1007/978-3-642-38980-119
[6]  
[Anonymous], 2017, 11 USENIX WORKSHOP O
[7]  
[Anonymous], 2015, P 13 ANN INT C MOB S
[8]  
[Anonymous], 2012, P 21 USENIX SEC S
[9]  
*ARM, 2009, SEC TECHN BUILD SEC
[10]  
Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689