A comprehensive survey of hardware-assisted security: From the edge to the cloud

被引:36
作者
Coppolino, Luigi [1 ]
D'Antonio, Salvatore [1 ]
Mazzeo, Giovanni [1 ]
Romano, Luigi [1 ]
机构
[1] Univ Naples Parthenope, Ctr Direz, Isola C4, I-80133 Naples, Italy
基金
欧盟地平线“2020”;
关键词
Hardware-assisted security; IoT security; Cloud security; Edge computing; Trusted computing;
D O I
10.1016/j.iot.2019.100055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sensitive data processing occurs more and more on machines or devices out of users control. In the Internet of Things world, for example, the security of data could be posed at risk regardless the adopted deployment is oriented on Cloud or Edge Computing. In these systems different categories of attacks-such as physical bus sniffing, cold boot, cache side-channel, buffer overflow, code-reuse, or Iago-can be realized. Software-based countermeasures have been proposed. However, the severity and complexity of these attacks require a level of security that only the hardware support can ensure. In the last years, major companies released a number of architectural extensions aiming at provide hardware-assisted security to software. In this paper, we realize a comprehensive survey of HW-assisted technological solutions produced by vendors like Intel, AMD, and ARM for both embedded edge-devices and hosting machines such as cloud servers. The different approaches are classified based on the type of attacks prevented and the enforced techniques. An analysis on their mechanisms, issues, and market adoption is provided to support investigations of researchers approaching to this field of systems security. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:17
相关论文
共 61 条
[1]   A comparison of software and hardware techniques for x86 virtualization [J].
Adams, Keith ;
Agesen, Ole .
ACM SIGPLAN NOTICES, 2006, 41 (11) :2-13
[2]  
Al-Omary A., 2018, KnE Engineering, P52
[3]  
AMD, 2019, AMD VIRT
[4]  
Anati Ittai, 2013, PROC 2 INT WORKSHOP
[5]  
[Anonymous], 2011, Following the White Rabbit: Software attacks against Intel (R) VT-d technology
[6]  
[Anonymous], 2011, P 2011 C NETW INF SY, DOI DOI 10.1109/SAR-SSI.2011.5931360
[7]  
[Anonymous], 2016, AMD x86 memory encryption technologies
[8]  
Argyros G., 2012, 21 USENIX SEC S USEN, P81
[9]  
ARM, 2009, TECH REP SEC TECHN B
[10]  
Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689