Colony: A Privileged Trusted Execution Environment With Extensibility

被引:9
|
作者
Xia, Yubin [1 ]
Hua, Zhichao [1 ]
Yu, Yang [1 ]
Gu, Jinyu [1 ]
Chen, Haibo [1 ]
Zang, Binyu [1 ]
Guan, Haibing [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai Key Lab Scalable Comp & Syst, Shanghai 200240, Peoples R China
关键词
Semantics; System software; Hardware; Virtual machine monitors; Security; Kernel; Monitoring; System security; trusted execution environment; operating system; virtualization;
D O I
10.1109/TC.2021.3055293
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The code base of system software is growing fast, which results in a large number of vulnerabilities: for example, 296 CVEs have been found in Xen hypervisor and 2195 CVEs in Linux kernel. To reduce the reliance on the trust of system software, many researchers try to provide trusted execution environments (TEEs), which can be categorized into two types: non-privileged TEEs and privileged TEEs. Non-privileged TEEs (e.g., Intel SGX) are extensible, but cannot protect security services like virtual machine introspection (VMI) due to the lack of system-level semantics. On the contrary, privileged TEEs (e.g., the secure world of ARM TrustZone) have system-level semantics, but any additional service implemented in the privileged TEE directly increases the TCB of the entire system. In this article, we propose a new design of TEE to support system-level security services and achieve better extensibility with a small TCB. Each TEE instance of the proposed design is named a Colony. Specifically, we introduce a secure monitor for isolation and capability management. Each Colony is assigned capabilities to access only necessary system-level semantics. We use the new TEE to build four security services, including secure device accessing, VMI tools, a system call tracer, and a much more complex service to virtualize ARM TrustZone with multiple Colonies. We have implemented the system on ARMv7 and ARMv8 platforms, in Xen hypervisor and Linux kernel, and perform a detailed evaluation to show its efficiency.(1) 1. This paper is an extended version of the conference paper published in USENIX Security'17: vTZ: Virtualizing ARM TrustZone [29] . A brief summary of differences is in Section8 .
引用
收藏
页码:479 / 492
页数:14
相关论文
共 50 条
  • [1] Awesome Trusted Execution Environment
    Coppolino, Luigi
    Mazzeo, Giovanni
    Romano, Luigi
    [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 5 - 6
  • [2] A Quantum Computer Trusted Execution Environment
    Trochatos, Theodoros
    Xu, Chuanqi
    Deshpande, Sanjay
    Lu, Yao
    Ding, Yongshan
    Szefer, Jakub
    [J]. IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (02) : 177 - 180
  • [3] Trusted Execution Environment: What It Is, and What It Is Not
    Sabet, Mohamed
    Achemlal, Mohammed
    Bouabdallah, Abdelmadjid
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 57 - 64
  • [4] A Quantum Computer Trusted Execution Environment
    Trochatos, Theodoros
    Xu, Chuanqi
    Deshpande, Sanjay
    Lu, Yao
    Ding, Yongshan
    Szefer, Jakub
    [J]. 2024 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA 2024, 2024, : 613 - 613
  • [5] SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
    Jang, Jinsoo
    Kong, Sunjune
    Kim, Minsu
    Kim, Daegyeong
    Kang, Brent Byunghoon
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [6] Securing a communication channel for the trusted execution environment
    Jang, Jinsoo
    Kang, Brent Byunghoon
    [J]. COMPUTERS & SECURITY, 2019, 83 : 79 - 92
  • [7] Trusted Execution Environment for Decentralized Process Mining
    Goretti, Valerio
    Basile, Davide
    Barbaro, Luca
    Di Ciccio, Claudio
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2024, 2024, 14663 : 509 - 527
  • [8] Formal Specification of Trusted Execution Environment APIs
    Yu, Geunyeol
    Chae, Seunghyun
    Bae, Kyungmin
    Moon, Sungkun
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2024, 2024, 14573 : 101 - 121
  • [9] Trusted Execution Environment for Data Protection in Cloud
    Srinivas, Podili V. S.
    Pravallika, Ch
    Raju, K. Srujan
    [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 3, INDIA 2016, 2016, 435 : 657 - 665
  • [10] Building a Lightweight Trusted Execution Environment for Arm GPUs
    Wang, Chenxu
    Deng, Yunjie
    Ning, Zhenyu
    Leach, Kevin
    Li, Jin
    Yan, Shoumeng
    He, Zhengyu
    Cao, Jiannong
    Zhang, Fengwei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3801 - 3816