DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines

被引:0
|
作者
Ruan, Wenwen [1 ,2 ]
Wang, Wenhao [1 ,2 ]
Liu, Shuang [3 ]
Duan, Ran [3 ]
Yan, Shoumeng [3 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
[3] Ant Grp, Hangzhou, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
ATTACKS;
D O I
10.1007/978-3-031-45933-7_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there has been a rise in the use of confidential computing as a new computing paradigm that enables privacy-preserving computation on sensitive and regulated data. This approach relies heavily on hardware-based Trusted Execution Environments (TEE), which establish isolated regions for data processing within a protected CPU region. Currently, a variety of TEEs (such as p-enclave in HyperEnclave and AMD SEV) support privilege separation and running a fully-fledged operating system within the confidential Virtual Machines (VMs). However, running a fully-fledged operating system inevitably increases the trusted computing base (TCB), making it challenging to conduct security verification. To address the problem, this paper studies the cases when complex OS services (such as device drivers and networking etc.) are removed from the confidential VM, and presents DomainIsolation, a page table based lightweight and efficient isolation scheme. We show that DomainIsolation enhances both the security and performance of enclave applications through several case studies, including confinement for untrusted libraries, fine-grained data protection, and fast communication. We have integrated DomainIsolation with the Occlum library OS, Enarx and ported several real-world applications. The evaluations on common benchmarks and applications (such as NBench, Lighttpd, Redis and OpenSSL) show that DomainIsolation only introduces a low overhead (<2% in most cases).
引用
收藏
页码:23 / 41
页数:19
相关论文
共 24 条
  • [1] A Hardware-Software Co-design for Efficient Intra-Enclave Isolation
    Gu, Jinyu
    Zhu, Bojun
    Li, Mingyu
    Li, Wentai
    Xia, Yubin
    Chen, Haibo
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3129 - 3145
  • [2] A Lightweight Security Isolation Approach for Virtual Machines Deployment
    Liang, Hongliang
    Han, Changyao
    Zhang, Daijie
    Wu, Dongyang
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 516 - 529
  • [3] Trustworthy confidential virtual machines for the masses
    Galanou, Anna
    Bindlish, Khushboo
    Preibsch, Luca
    Pignolet, Yvonne-Anne
    Fetzer, Christof
    Kapitza, Ruediger
    [J]. PROCEEDINGS OF THE 24TH ACM/IFIP INTERNATIONAL MIDDLEWARE CONFERENCE, MIDDLEWARE 2023, 2023, : 316 - 328
  • [4] VEIL: A Protected Services Framework for Confidential Virtual Machines
    Ahmad, Adil
    Ou, Botong
    Liu, Congyu
    Zhang, Xiaokuan
    Fonseca, Pedro
    [J]. PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, ASPLOS 2023, VOL 4, 2023, : 378 - 393
  • [5] TwinVisor: Hardware-isolated Confidential Virtual Machines for ARM
    Li, Dingji
    Mi, Zeyu
    Xia, Yubin
    Zang, Binyu
    Chen, Haibo
    Guan, Haibing
    [J]. PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, SOSP 2021, 2021, : 638 - 654
  • [6] Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
    Yang, Zihan
    Mi, Zeyu
    Xia, Yubin
    [J]. 2019 13TH IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE) / 10TH INTERNATIONAL WORKSHOP ON JOINT CLOUD COMPUTING (JCC) / IEEE INTERNATIONAL WORKSHOP ON CLOUD COMPUTING IN ROBOTIC SYSTEMS (CCRS), 2019, : 257 - 262
  • [7] PMonitor: A Lightweight Performance Monitor for Virtual Machines
    Shao, Zhiyuan
    Jin, Hai
    Lu, Xiaowen
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, : 689 - 693
  • [8] CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments
    Pecholt, Joana
    Wessel, Sascha
    [J]. PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 989 - 998
  • [9] MBSA: a lightweight and flexible storage architecture for virtual machines
    Chen, Xian
    Chen, Wenzhi
    Lu, Zhongyong
    Zhang, Yu
    Chang, Rui
    Hassan, Mohammad Mehedi
    Alelaiwi, Abdulhameed
    Xiang, Yang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
  • [10] Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services
    Wang, Wenhao
    Liu, Weijie
    Chen, Hongbo
    Wang, XiaoFeng
    Tian, Hongliang
    Lin, Dongdai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 522 - 538