A Hardware-Based Correct Execution Environment Supporting Virtual Memory

被引:0
|
作者
Lee, Daehyeon [1 ]
Shin, Ohsuk [1 ]
Cha, Yeonghyeon [1 ]
Lee, Junghee [1 ]
Yun, Taisic [2 ]
Kim, Jihye [3 ]
Oh, Hyunok [4 ]
Nicopoulos, Chrysostomos [5 ]
Lee, Sang Su [6 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
[2] Korea Adv Inst Sci & Technol, Grad Sch Informat Secur, Daejeon 34141, South Korea
[3] Kookmin Univ, Elect & Informat Syst Engn Major, Seoul 02707, South Korea
[4] Hanyang Univ, Dept Informat Syst, Seoul 04763, South Korea
[5] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
[6] ETRI, Cyber Secur Res Div, Daejeon 34129, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Operating systems; Hardware; Security; Memory management; Threat modeling; Servers; Data processing; Outsourcing; Cloud computing; Trusted computing; verifiable computation; isolation;
D O I
10.1109/ACCESS.2024.3443509
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid increase in data generation has led to outsourcing computation to cloud service providers, allowing clients to handle large tasks without investing resources. However, this brings up security concerns, and while there are solutions like fully homomorphic encryption and specific task-oriented methods, challenges in optimizing performance and enhancing security models remain for widespread industry adoption. Outsourcing computations to an untrusted remote computer can be risky, but attestation techniques and verifiable computation schemes aim to ensure the correct execution of outsourced computations. Nevertheless, the latter approach incurs significant overhead in generating a proof for the client. To minimize this overhead, the concept of a Correct Execution Environment (CEE) has been proposed (CEEv1), which omits proof generation for trusted parts of the prover. This paper proposes a new hardware-based CEE (CEEv2) that supports virtual memory and uses an inverted page table mechanism to detect, or prevent, illegal modifications to page mappings. The proposed mechanism supports virtual memory and thwarts virtual-to-physical mapping attacks, while minimizing software modifications. The paper also compares the proposed mechanism to other similar mechanisms used in AMD's SEV-SNP and Intel's SGX.
引用
收藏
页码:114008 / 114022
页数:15
相关论文
共 50 条
  • [1] Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment
    Lee, Junghee
    Nicopoulos, Chrysostomos
    Jeong, Gweonho
    Kim, Jihye
    Oh, Hyunok
    IEEE ACCESS, 2020, 8 : 216689 - 216706
  • [2] Supporting Trusted Virtual Machines with Hardware-Based Secure Remote Memory
    Heo, Taekyung
    Kang, Seunghyo
    Lee, Sanghyeon
    Hwang, Soojin
    Park, Joongun
    Huh, Jaehyuk
    PROCEEDINGS OF THE 2024 ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON MEMORY MANAGEMENT, ISMM 2024, 2024, : 43 - 56
  • [3] Control plane of a programmable hardware-based virtual router
    Yang, Mao
    Liu, Zhongjin
    Li, Yong
    Zeng, Lieguang
    Jin, Depeng
    Su, Li
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2012, 52 (05): : 586 - 591
  • [4] Hardware-based Always-On Heap Memory Safety
    Kim, Yonghae
    Lee, Jaekyu
    Kim, Hyesoon
    2020 53RD ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO 2020), 2020, : 1153 - 1166
  • [5] A hardware-based algorithm for virtual machine provisioning in a private cloud
    Amol Jaikar
    Gyeong-Ryoon Kim
    Dada Huang
    Seo-Young Noh
    Journal of Central South University, 2014, 21 : 4291 - 4295
  • [6] A hardware-based algorithm for virtual machine provisioning in a private cloud
    Amol JAIKAR
    Gyeong-Ryoon KIM
    Dada HUANG
    Seo-Young NOH
    Journal of Central South University, 2014, 21 (11) : 4291 - 4295
  • [7] An AES chip with DPA resistance using hardware-based random order execution
    Yu Bo
    Li Xiangyu
    Chen Cong
    Sun Yihe
    Wu Liji
    Zhang Xiangmin
    JOURNAL OF SEMICONDUCTORS, 2012, 33 (06)
  • [8] A hardware-based algorithm for virtual machine provisioning in a private cloud
    Jaikar, Amol
    Kim, Gyeong-Ryoon
    Huang, Dada
    Noh, Seo-Young
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2014, 21 (11) : 4291 - 4295
  • [9] Nitro: Hardware-Based System Call Tracing for Virtual Machines
    Pfoh, Jonas
    Schneider, Christian
    Eckert, Claudia
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 96 - 112
  • [10] An AES chip with DPA resistance using hardware-based random order execution
    俞波
    李翔宇
    陈聪
    孙义和
    乌力吉
    张向民
    Journal of Semiconductors, 2012, (06) : 101 - 108