Aurora: Providing Trusted System Services for Enclaves On an Untrusted System

02/10/2018
by   Hongliang Liang, et al.
0

Intel SGX provisions shielded executions for security-sensitive computation, but lacks support for trusted system services (TSS), such as clock, network and filesystem. This makes enclaves vulnerable to Iago attacks DBLP:conf/asplos/CheckowayS13 in the face of a powerful malicious system. To mitigate this problem, we present Aurora, a novel architecture that provides TSSes via a secure channel between enclaves and devices on top of an untrusted system, and implement two types of TSSes, i.e. clock and end-to-end network. We evaluate our solution by porting SQLite and OpenSSL into Aurora, experimental results show that SQLite benefits from a microsecond accuracy trusted clock and OpenSSL gains end-to-end secure network with about 1ms overhead.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/27/2020

Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services

The 5G network systems are evolving and have complex network infrastruct...
research
05/02/2022

HTTPA/2: a Trusted End-to-End Protocol for Web Services

We received positive feedback and inquiries on the previous work of HTTP...
research
09/14/2019

iperfTZ: Understanding Network Bottlenecks for TrustZone-based Trusted Applications

The growing availability of hardware-based trusted execution environment...
research
07/22/2022

Secure and Lightweight Strong PUF Challenge Obfuscation with Keyed Non-linear FSR

We propose a secure and lightweight key based challenge obfuscation for ...
research
04/25/2019

Developing Secure Services for IoT with OP-TEE: A First Look at Performance and Usability

The implementation, deployment and testing of secure services for Intern...
research
01/16/2021

T-Lease: A Trusted Lease Primitive for Distributed Systems

A lease is an important primitive for building distributed protocols, an...
research
06/17/2019

Using Trusted Execution Environments for Secure Stream Processing of Medical Data

Processing sensitive data, such as those produced by body sensors, on th...

Please sign up or login with your details

Forgot password? Click here to reset