SCONE: Secure Linux Containers with Intel SGX

被引:0
|
作者
Arnautov, Sergei [1 ]
Trach, Bohdan [1 ]
Gregor, Franz [1 ]
Knauth, Thomas [1 ]
Martin, Andre [1 ]
Priebe, Christian [2 ]
Lind, Joshua [2 ]
Muthukumaran, Divya [2 ]
O'Keeffe, Dan [2 ]
Stillwell, Mark L. [2 ]
Goltzsche, David [3 ]
Eyers, David [4 ]
Kapitza, Rudiger [3 ]
Pietzuch, Peter [2 ]
Fetzer, Christof [1 ]
机构
[1] Tech Univ Dresden, Fak Informat, Dresden, Germany
[2] Imperial Coll London, Dept Comp, London, England
[3] TU Braunschweig, Informat, Braunschweig, Germany
[4] Univ Otago, Dept Comp Sci, Dunedin, New Zealand
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In multi-tenant environments, Linux containers managed by Docker or Kubernetes have a lower resource footprint, faster startup times, and higher I/O performance compared to virtual machines (VMs) on hypervisors. Yet their weaker isolation guarantees, enforced through software kernel mechanisms, make it easier for attackers to compromise the confidentiality and integrity of application data within containers. We describe SCONE, a secure container mechanism for Docker that uses the SGX trusted execution support of Intel CPUs to protect container processes from outside attacks. The design of SCONE leads to (i) a small trusted computing base (TCB) and (ii) a low performance overhead: SCONE offers a secure C standard library interface that transparently encrypts/decrypts I/O data; to reduce the performance impact of thread synchronization and system calls within SGX enclaves, SCONE supports user-level threading and asynchronous system calls. Our evaluation shows that it protects unmodified applications with SGX, achieving 0.6x-1.2x of native throughput.
引用
收藏
页码:689 / 703
页数:15
相关论文
共 50 条
  • [21] Protecting OpenFlow using Intel SGX
    Medina, Jorge
    Paladi, Nicolae
    Arlos, Patrik
    [J]. 2019 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2019,
  • [22] Practical Enclave Malware with Intel SGX
    Schwarz, Michael
    Weiser, Samuel
    Gruss, Daniel
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019), 2019, 11543 : 177 - 196
  • [23] A survey of Intel SGX and its applications
    Wei ZHENG
    Ying WU
    Xiaoxue WU
    Chen FENG
    Yulei SUI
    Xiapu LUO
    Yajin ZHOU
    [J]. Frontiers of Computer Science., 2021, (03) - 205
  • [24] sgx-perf: A Performance Analysis Tool for Intel SGX Enclaves
    Weichbrodt, Nico
    Aublin, Pierre-Louis
    Kapitza, Ruediger
    [J]. MIDDLEWARE'18: PROCEEDINGS OF THE 2018 ACM/IFIP/USENIX MIDDLEWARE CONFERENCE, 2018, : 201 - 213
  • [25] POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave
    Ding, Yu
    Duan, Ran
    Li, Long
    Cheng, Yueqiang
    Zhang, Yulong
    Chen, Tanghui
    Wei, Tao
    Wang, Huibo
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2491 - 2493
  • [26] Secure and Scalable Key Value Storage for Managing Big Data in Smart Cities using Intel SGX
    Feher, Marcell
    Lucani, Daniel E.
    Fonseca, Keiko
    Rosa, Marcelo
    Despotov, Bogdan
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2018, : 70 - 76
  • [27] SGXoMeter: Open and Modular Benchmarking for Intel SGX
    Mahhouk, Mohammad
    Weichbrodt, Nico
    Kapitza, Ruediger
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2021), 2021, : 55 - 61
  • [28] Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card
    Chakrabarti, Somnath
    Hoekstra, Matthew
    Kuvaiskii, Dmitrii
    Vij, Mona
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP '19, 2019,
  • [29] Benchmarking the Second Generation of Intel SGX Hardware
    El-Hindi, Muhammad
    Ziegler, Tobias
    Heinrich, Matthias
    Lutsch, Adrian
    Zhao, Zheguang
    Binnig, Carsten
    [J]. 18TH INTERNATIONAL WORKSHOP ON DATA MANAGEMENT ON NEW HARDWARE, DAMON 2022, 2022,
  • [30] Isolating Operating System Components with Intel SGX
    Richter, Lars
    Goetzfried, Johannes
    Mueller, Tilo
    [J]. SYSTEX 2016: 1ST WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION, 2016,