SofTEE: Software-Based Trusted Execution Environment for User Applications

被引:6
作者
Lee, Unsung [1 ]
Park, Chanik [1 ]
机构
[1] Pohang Univ Sci & Technol, Dept Comp Sci & Engn, Pohang 37673, South Korea
关键词
Address space identifier; kernel deprivileging; trusted execution environment; HARDWARE;
D O I
10.1109/ACCESS.2020.3006703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment. In response to this demand, hardware-based trusted execution environments such as Intel SGX and ARM TrustZone have been developed in commodity computers. However, hardware-based approaches cannot be quickly upgraded to address design vulnerabilities or to reflect customer feedback. In this paper, we propose SofTEE, a software framework to support a trusted execution environment for user applications. For a trusted execution environment, SofTEE should support memory isolation and attestation. For memory isolation, SofTEE relies on kernel deprivileging which delegates the execution of privileged operations such as memory management, from a kernel to a special module called a security monitor. To reduce the overhead of switching between the deprivileged kernel and the security monitor, SofTEE proposes an efficient management mechanism of the address space identifier. SofTEE supports attestation by assuming minimal hardware functionalities of random entropy and root of trust. The main challenge of SofTEE is to guarantee security properties like confidentiality and integrity of security-sensitive applications. For security analysis, we have identified security invariants that SofTEE should meet for confidentiality and integrity guarantees. Based on the security invariants, we have designed and prototyped each component of SofTEE on a Raspberry Pi 3 board. SofTEE produces about 3% overhead in case of a security-sensitive application with long execution time and 23% overhead in case of a security-sensitive application with short execution time.
引用
收藏
页码:121874 / 121888
页数:15
相关论文
共 69 条
  • [1] Accetta M., 1986, P USENIX C, P1
  • [2] [Anonymous], 2017, P IEEE 21 INT C PULS, DOI DOI 10.1109/PPC.2017.8291217
  • [3] [Anonymous], 2016, ARM ARCHITECTURE REF
  • [4] [Anonymous], 2009, PROC 2 EUROPEAN WORK
  • [5] [Anonymous], 2012, ARM SYST MEM MAN UN
  • [6] [Anonymous], 2014, 329298002 INT CORP
  • [7] [Anonymous], FDUPPITR20070801
  • [8] [Anonymous], 2009, Proceedings of the 18th USENIX Security Symposium
  • [9] [Anonymous], INT 64 IA 32 ARCH SO
  • [10] [Anonymous], 2012, ARM ARCHITECTURE REF