Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors

arxiv(2020)

引用 22|浏览97
暂无评分
摘要
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features, brings a risk of introducing new such side-channel attacks. This paper studies the problem of extending a processor with new features without weakening the security of the isolation mechanisms that the processor offers. We propose to use full abstraction as a formal criterion for the security of a processor extension, and we instantiate that criterion to the concrete case of extending a microprocessor that supports enclaved execution with secure interruptibility of these enclaves. This is a very relevant instantiation as several recent papers have shown that interruptibility of enclaves leads to a variety of software-based side-channel attacks. We propose a design for interruptible enclaves, and prove that it satisfies our security criterion. We also implement the design on an open-source enclave-enabled microprocessor, and evaluate the cost of our design in terms of performance and hardware size.
更多
查看译文
关键词
provably secure isolation,interruptible enclaved execution,small microprocessors,computer systems,hardware support,isolation mechanisms,privilege levels,virtual memory,successful software-based side-channel attacks,microarchitectural features,processor offers,formal criterion,processor extension,secure interruptibility,interruptible enclaves,security criterion,open-source enclave-enabled microprocessor
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要