Securing Interruptible Enclaved Execution on Small Microprocessors

نویسندگان

چکیده

Computer systems often provide hardware support for isolation mechanisms such as privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, at least significantly weaken, these offer. Extending a processor with new architectural micro-architectural features brings risk of introducing attacks. This article studies problem extending without weakening security offers. Our solution is heavily based on techniques from research programming languages. More specifically, we propose to use language concept full abstraction general formal criterion extension. We instantiate proposed concrete case microprocessor supports execution secure interruptibility. very relevant instantiation, recent papers shown interruptibility enclaves leads variety design interruptible and prove it satisfies our criterion. also implement an open-source enclave-enabled evaluate cost in terms performance size.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LEVEEFS : Securing Access to Untrusted Filesystems in Enclaved Execution

Enclaved execution techniques like Intel SGX guarantee secure execution of applications in presence of a compromised operating system. However, these techniques still rely on the underlying OS for services such as filesystem management. In this paper, we present attacks called syscall-abuse attacks on applications such as OpenSSL and ClamAV in presence of a compromised filesystem management ser...

متن کامل

Interruptible Task Execution with Resumption in Golog

Mobile robots should perform a growing number of tasks and react to time-critical events. Thus, the ability to interrupt a task and resume it later is crucial. While interleaved execution occurs often in robotics, existing approaches do not consider the fact that interrupting a task and resuming an interrupted task often requires intermediate steps. In this paper we present an approach to inter...

متن کامل

Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution

Protected module architectures, such as Intel SGX, enable strong trusted computing guarantees for hardwareenforced enclaves on top a potentially malicious operating system. However, such enclaved execution environments are known to be vulnerable to a powerful class of controlled-channel attacks. Recent research convincingly demonstrated that adversarial system software can extract sensitive dat...

متن کامل

An Architecture Framework for Introducing Predicated Execution into Embedded Microprocessors

Growing demand for high performance in embedded systems is creating new opportunities for Instruction-Level Parallelism (ILP) techniques that are traditionally used in high performance systems. Predicated execution, an important ILP technique, can be used to improve branch handling, reduce frequently mispredicted branches, and expose multiple execution paths to hardware resources. However, ther...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Programming Languages and Systems

سال: 2021

ISSN: ['1558-4593', '0164-0925']

DOI: https://doi.org/10.1145/3470534