Securing Interruptible Enclaved Execution on Small Microprocessors
نویسندگان
چکیده
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, at least significantly weaken, these offer. Extending a processor with new architectural micro-architectural features brings risk of introducing attacks. This article studies problem extending without weakening security offers. Our solution is heavily based on techniques from research programming languages. More specifically, we propose to use language concept full abstraction general formal criterion extension. We instantiate proposed concrete case microprocessor supports execution secure interruptibility. very relevant instantiation, recent papers shown interruptibility enclaves leads variety design interruptible and prove it satisfies our criterion. also implement an open-source enclave-enabled evaluate cost in terms performance size.
منابع مشابه
LEVEEFS : Securing Access to Untrusted Filesystems in Enclaved Execution
Enclaved execution techniques like Intel SGX guarantee secure execution of applications in presence of a compromised operating system. However, these techniques still rely on the underlying OS for services such as filesystem management. In this paper, we present attacks called syscall-abuse attacks on applications such as OpenSSL and ClamAV in presence of a compromised filesystem management ser...
متن کاملInterruptible Task Execution with Resumption in Golog
Mobile robots should perform a growing number of tasks and react to time-critical events. Thus, the ability to interrupt a task and resume it later is crucial. While interleaved execution occurs often in robotics, existing approaches do not consider the fact that interrupting a task and resuming an interrupted task often requires intermediate steps. In this paper we present an approach to inter...
متن کاملTelling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution
Protected module architectures, such as Intel SGX, enable strong trusted computing guarantees for hardwareenforced enclaves on top a potentially malicious operating system. However, such enclaved execution environments are known to be vulnerable to a powerful class of controlled-channel attacks. Recent research convincingly demonstrated that adversarial system software can extract sensitive dat...
متن کاملAn Architecture Framework for Introducing Predicated Execution into Embedded Microprocessors
Growing demand for high performance in embedded systems is creating new opportunities for Instruction-Level Parallelism (ILP) techniques that are traditionally used in high performance systems. Predicated execution, an important ILP technique, can be used to improve branch handling, reduce frequently mispredicted branches, and expose multiple execution paths to hardware resources. However, ther...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Programming Languages and Systems
سال: 2021
ISSN: ['1558-4593', '0164-0925']
DOI: https://doi.org/10.1145/3470534