A Design and Verification Methodology for Secure Isolated Regions

被引:0
|
作者
Sinha, Rohit [1 ]
Costa, Manuel [2 ]
Lal, Akash [3 ]
Lopes, Nuno P. [2 ]
Rajamani, Sriram [3 ]
Seshia, Sanjit A.
Vaswani, Kapil [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Microsoft Res, London, England
[3] Microsoft Res, Bengaluru, Karnataka, India
基金
美国国家科学基金会;
关键词
Enclave Programs; Secure Computation; Confidentiality; Formal Verification; INFORMATION-FLOW;
D O I
10.1145/2908080.2908113
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Hardware support for isolated execution (such as Intel SGX) enables development of applications that keep their code and data confidential even while running on a hostile or compromised host. However, automatically verifying that such applications satisfy confidentiality remains challenging. We present a methodology for designing such applications in a way that enables certifying their confidentiality. Our methodology consists of forcing the application to communicate with the external world through a narrow interface, compiling it with runtime checks that aid verification, and linking it with a small runtime library that implements the interface. The runtime library includes core services such as secure communication channels and memory management. We formalize this restriction on the application as Information Release Confinement (IRC), and we show that it allows us to decompose the task of proving confidentiality into (a) one-time, human-assisted functional verification of the runtime to ensure that it does not leak secrets, (b) automatic verification of the application's machine code to ensure that it satisfies IRC and does not directly read or corrupt the runtime's internal state. We present/CONFIDENTIAL: a verifier for IRC that is modular, automatic, and keeps our compiler out of the trusted computing base. Our evaluation suggests that the methodology scales to real-world applications.
引用
收藏
页码:665 / 681
页数:17
相关论文
共 50 条
  • [1] Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems
    Levshun, Dmitry
    Chechulin, Andrey
    Kotenko, Igor
    Chevalier, Yannick
    [J]. 2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [2] A "Design for verification" methodology
    Sforza, F
    Battù, L
    Brunelli, M
    Castelnuovo, A
    Magnaghi, M
    [J]. INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, PROCEEDINGS, 2001, : 50 - 55
  • [3] A secure Scan Design Methodology
    Hely, David
    Bancel, Frederic
    Flottes, Marie-Lise
    Rouzeyre, Bruno
    [J]. 2006 DESIGN AUTOMATION AND TEST IN EUROPE, VOLS 1-3, PROCEEDINGS, 2006, : 1177 - +
  • [4] A methodology for secure software design
    Fernandez, EB
    [J]. SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 130 - 136
  • [5] A Secure Software Design Methodology
    Goel, Rajat
    Govil, Mahesh Chandra
    Singh, Girdhari
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 2484 - 2488
  • [6] A TLM design for verification methodology
    Bombieri, Nicola
    Fummi, Franco
    Pravadelli, Graziano
    [J]. PRIME 2006: 2ND CONFERENCE ON PH.D. RESEARCH IN MICROELECTRONIC AND ELECTRONICS, PROCEEDINGS, 2006, : 337 - +
  • [7] Adaption of a Secure Software Development Methodology for Secure Engineering Design
    Von Solms, Sune
    Futcher, Lynn A.
    [J]. IEEE ACCESS, 2020, 8 : 125630 - 125637
  • [8] Theory and verification of operator design methodology
    HU ZiYi1
    2Institute of Microelectronics
    [J]. Science China(Information Sciences), 2012, 55 (02) : 480 - 490
  • [9] Commercial design verification: Methodology and tools
    Pixley, C
    Strader, NR
    Bruce, WC
    Park, JH
    Kaufmann, M
    Shultz, K
    Burns, M
    Kumar, J
    Yuan, J
    Nguyen, J
    [J]. INTERNATIONAL TEST CONFERENCE 1996, PROCEEDINGS, 1996, : 839 - 848
  • [10] Theory and verification of operator design methodology
    Hu ZiYi
    Zhao Yong
    Wang XinAn
    Huang Ru
    Wang Teng
    Zhang Xing
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (02) : 480 - 490