SofTEE: Software-Based Trusted Execution Environment for User Applications

被引:6
作者
Lee, Unsung [1 ]
Park, Chanik [1 ]
机构
[1] Pohang Univ Sci & Technol, Dept Comp Sci & Engn, Pohang 37673, South Korea
关键词
Address space identifier; kernel deprivileging; trusted execution environment; HARDWARE;
D O I
10.1109/ACCESS.2020.3006703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment. In response to this demand, hardware-based trusted execution environments such as Intel SGX and ARM TrustZone have been developed in commodity computers. However, hardware-based approaches cannot be quickly upgraded to address design vulnerabilities or to reflect customer feedback. In this paper, we propose SofTEE, a software framework to support a trusted execution environment for user applications. For a trusted execution environment, SofTEE should support memory isolation and attestation. For memory isolation, SofTEE relies on kernel deprivileging which delegates the execution of privileged operations such as memory management, from a kernel to a special module called a security monitor. To reduce the overhead of switching between the deprivileged kernel and the security monitor, SofTEE proposes an efficient management mechanism of the address space identifier. SofTEE supports attestation by assuming minimal hardware functionalities of random entropy and root of trust. The main challenge of SofTEE is to guarantee security properties like confidentiality and integrity of security-sensitive applications. For security analysis, we have identified security invariants that SofTEE should meet for confidentiality and integrity guarantees. Based on the security invariants, we have designed and prototyped each component of SofTEE on a Raspberry Pi 3 board. SofTEE produces about 3% overhead in case of a security-sensitive application with long execution time and 23% overhead in case of a security-sensitive application with short execution time.
引用
收藏
页码:121874 / 121888
页数:15
相关论文
共 69 条
  • [51] MITRE, 2017, CVE20175691 MITRE
  • [52] Raj H, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P841
  • [53] Raj Himanshu, 2009, Proceedings of the workshop on Cloud computing security, P77, DOI DOI 10.1145/1655008.1655019
  • [54] Ray D, 2012, POPL 12: PROCEEDINGS OF THE 39TH ANNUAL ACM SIGPLAN-SIGACT SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES, P179
  • [55] Schwarz M, 2019, PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), P753
  • [56] Secure Technology Alliance, TRUST EX ENV TEE 101
  • [57] Preventing Page Faults from Telling Your Secrets
    Shinde, Shweta
    Chua, Zheng Leong
    Narayanan, Viswesh
    Saxena, Prateek
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 317 - 328
  • [58] Song C, 2016, P IEEE S SECUR PRIV, P1, DOI [10.1109/SP.2016.9, 10.1109/iFUZZY.2016.8004943]
  • [59] Stewin P., 2012, DIMVA
  • [60] TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices
    Sun, He
    Sun, Kun
    Wang, Yuewu
    Jing, Jiwu
    Wang, Haining
    [J]. 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 367 - 378