Foundations of Hardware-Based Attested Computation and Application to SGX

被引:30
|
作者
Barbosa, Manuel [1 ]
Portela, Bernardo [2 ]
Scerri, Guillaume [3 ]
Warinschi, Bogdan [3 ]
机构
[1] FCUP, HASLab, INESC TEC, Oporto, Portugal
[2] UMinho, INESC TEC, HASLab, Braga, Portugal
[3] Univ Bristol, Bristol BS8 1TH, Avon, England
关键词
ANONYMOUS ATTESTATION SCHEME; SECURE;
D O I
10.1109/EuroSP.2016.28
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Exciting new capabilities of modern trusted hardware technologies allow for the execution of arbitrary code within environments completely isolated from the rest of the system and provide cryptographic mechanisms for securely reporting on these executions to remote parties. Rigorously proving security of protocols that rely on this type of hardware faces two obstacles. The first is to develop models appropriate for the induced trust assumptions (e.g., what is the correct notion of a party when the peer one wishes to communicate with is a specific instance of an an outsourced program). The second is to develop scalable analysis methods, as the inherent stateful nature of the platforms precludes the application of existing modular analysis techniques that require high degrees of independence between the components. We give the first steps in this direction by studying three cryptographic tools which have been commonly associated with this new generation of trusted hardware solutions. Specifically, we provide formal security definitions, generic constructions and security analysis for attested computation, key-exchange for attestation and secure outsourced computation. Our approach is incremental: each of the concepts relies on the previous ones according to an approach that is quasi-modular. For example we show how to build a secure outsourced computation scheme from an arbitrary attestation protocol combined together with a key-exchange and an encryption scheme.
引用
收藏
页码:245 / 260
页数:16
相关论文
共 50 条
  • [1] A Hardware-Based Orientation Detection System Using Dendritic Computation
    Nomura, Masahiro
    Chen, Tianqi
    Tang, Cheng
    Todo, Yuki
    Sun, Rong
    Li, Bin
    Tang, Zheng
    [J]. ELECTRONICS, 2024, 13 (07)
  • [2] Application of hardware-based IT security measures in automation networks
    Runde, Markus
    Niemann, K. -H.
    Hausmann, Stefan
    Heiss, Stefan
    [J]. AUTOMATION 2012, 2012, 2171 : 391 - 394
  • [3] Efficient Hardware-Based Nonintrusive Dynamic Application Profiling
    Nair, Ajay
    Shankar, Karthik
    Lysecky, Roman
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2011, 10 (03)
  • [4] Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment
    Lee, Junghee
    Nicopoulos, Chrysostomos
    Jeong, Gweonho
    Kim, Jihye
    Oh, Hyunok
    [J]. IEEE ACCESS, 2020, 8 : 216689 - 216706
  • [5] Application Study of Hardware-Based Security for Future Industrial IoT
    Matischek, Rainer
    Bara, Benjamin
    [J]. 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 246 - 252
  • [6] VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface
    Chen, Zitai
    Vasilakis, Georgios
    Murdock, Kit
    Dean, Edward
    Oswald, David
    Garcia, Flavio D.
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 699 - 716
  • [7] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [8] Hardware-based Cyber Threats
    Alves, Thiago
    Morris, Thomas
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 259 - 266
  • [9] HPCgnature: a hardware-based application-level intrusion detection system
    Musavi, Seyyedeh Atefeh
    Hashemi, Mahmoud Reza
    [J]. IET INFORMATION SECURITY, 2019, 13 (01) : 19 - 26
  • [10] Performance characterization of a data mining application via hardware-based monitoring
    Thoennes, M
    Weems, C
    [J]. COMMERCIAL APPLICATIONS FOR HIGH-PERFORMANCE COMPUTING, 2001, 4528 : 109 - 117