Open-Source Hardware Memory Protection Engine Integrated With NVMM Simulator

被引:0
作者
Omori, Yu [1 ]
Kimura, Keiji [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Engn, Tokyo 1698050, Japan
关键词
Emulator; memory encryption; memory integrity; NVMM; RISC-V; simulator;
D O I
10.1109/LCA.2022.3197777
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With growing on-device IoT processing, security on edge devices becomes increasingly important. Among Trusted Execution Environment (TEE), an open-source RISC-V Keystone TEE is the expected one. However, some issues remain when applying it to various devices: untrusted DRAM, and untrusted path to non-volatile storage. These issues can be resolved by Memory Protection Engine (MPE) based on an integrity tree, and Non-Volatile Main Memory (NVMM), respectively. TEE, MPE, and NVMM must be cooperatively optimized to exploit performance. Despite this demand, there is no widely available platform which enables fast, reliable, and system-wide evaluation. In the paper, we provide an open-source hardware simulator for secure edge devices. We implemented an MPE using SGX-style Integrity Tree on the Keystone compatible RISC-V SoC. Then, we ported the NVMM simulation technique to it. Its whole design was publicized to widely provide a baseline hardware design. The MPE behavior was validated by using micro benchmarks. It revealed that the MPE read/write overhead 2.55 x /4.16x on DRAM, and 3.05 x /5.40x on NVMM, respectively Besides, we discuss our work's role by comparing with the gem5 considering TEE evaluation time and impact of the protected NVMM.
引用
收藏
页码:77 / 80
页数:4
相关论文
共 22 条
  • [1] Akram A., 2021, PROC WORKSHOP COMPUT
  • [2] Alves T., 2004, INFORM Q, V3, P18
  • [3] [Anonymous], 2017, 2017 IEEE 19 INT C E, DOI DOI 10.1109/HEALTHCOM.2017.8210833
  • [4] Bachrach J, 2012, DES AUT CON, P1212
  • [5] Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
  • [6] Costan V., 2016, INTEL SGX EXPLAINED, V2016, P1
  • [7] Elbaz R, 2007, LECT NOTES COMPUT SC, V4727, P289
  • [8] Gueron Shay., 2016, IACR CRYPTOL EPRINT, P204
  • [9] Gui A., 2020, PROC 4 WORKSHOP COMP
  • [10] Hin P. Y. H., 2021, PROC WORKSHOP COMPUT