DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing

被引:23
作者
Wang, Xiayang [1 ]
Huang, Fuqian [1 ]
Chen, Haibo [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
关键词
Data integrity checking; Hardware instruction tracing;
D O I
10.1186/s42400-018-0018-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently released Intel processors have been equipped with hardware instruction tracing facilities to securely and efficiently record the program execution path. In this paper, we study a case for data integrity checking based on Intel Processor Trace (Intel PT), the instruction tracing facility on x86 processors. We incorporate software instrumentation and hardware instruction tracing to guarantee fine-grained data integrity without frequently switching the processor mode. We incorporate the idea in a system named DTrace which provides primitives to instruct Intel PT to capture the data load and store events, even current Intel PT implementations only record control transfers. The trace is analyzed before the program makes security-sensitive operations. We apply DTrace in several case studies to show that the primitives that DTrace provides are easy to use and help to enhance data integrity in applications. We further evaluate DTrace with several microbenchmarks to show the time cost that DTrace's data tracing operation incurs. We also evaluate DTrace on Nginx to show the performance impact when Nginx is enhanced in security to provide the integrity during the runtime execution for programmer-defined security sensitive data. We find the performance overhead that DTrace incurs for the data tracing is moderate.
引用
收藏
页数:15
相关论文
共 43 条
[1]  
Abadi M, 2005, P 12 ACM C COMP COMM, P340, DOI [10.1145/1102120.1102165, DOI 10.1145/1102120.1102165]
[2]   Preventing memory error exploits with WIT [J].
Akritidis, Periklis ;
Cadar, Cristian ;
Raiciu, Costin ;
Costa, Manuel ;
Castro, Miguel .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :263-+
[3]  
[Anonymous], 2018, Amazon Elastic Compute Cloud
[4]  
[Anonymous], 2005, P 14 C USENIX SEC S
[5]  
[Anonymous], 2013, CVE-2013-2028
[6]  
ARM, 2016, ARM EMB TRAC MACR AR ARM EMB TRAC MACR AR
[7]   Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World [J].
Azab, Ahmed M. ;
Ning, Peng ;
Shah, Jitesh ;
Chen, Quan ;
Bhutkar, Rohan ;
Ganesh, Guruprasad ;
Ma, Jia ;
Shen, Wenbo .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :90-102
[8]   Shielding Applications from an Untrusted Cloud with Haven [J].
Baumann, Andrew ;
Peinado, Marcus ;
Hunt, Galen .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2015, 33 (03)
[9]  
Beeman S, 2017, SUPPORTED PROCESSORS
[10]  
Bletsch Tyler, 2011, P 6 ACM S INF COMP C, P30