BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking

04/20/2022
by   Hossam ElAtali, et al.
0

We present Blinded Memory (BliMe), a way to realize efficient and secure outsourced computation. BliMe consists of a novel and minimal set of ISA extensions that uses taint tracking to ensure the confidentiality of sensitive (client) data even in the presence of server malware, run-time attacks, and side-channel attacks. To secure outsourced computation, the BliMe extensions can be used together with an attestable, fixed-function trusted execution environment (TEE) and an encryption engine that provides atomic decrypt-and-taint and encrypt-and-untaint operations. The TEE engages in an attestation and key agreement protocol with the client. It provides the resulting client-specific keys to the encryption engine. Clients rely on remote attestation to ensure that their data will always be protected by BliMe's taint tracking policy after decryption. We provide a machine-checked security proof and an FPGA implementation (BliMe-Ibex) of BliMe's taint tracking policy. We show that BliMe-Ibex does not reduce performance relative to the unmodified core, and incurs only minor increases in resource consumption in terms of power (≈2.1%), LUTs (≈1.0%), and registers (≈2.3%).

READ FULL TEXT
research
10/15/2021

HTTPA: HTTPS Attestable Protocol

Hypertext Transfer Protocol Secure (HTTPS) protocol has become integral ...
research
06/23/2023

Preventing EFail Attacks with Client-Side WebAssembly: The Case of Swiss Post's IncaMail

Traditional email encryption schemes are vulnerable to EFail attacks, wh...
research
10/18/2022

Automatic Detection of Fake Key Attacks in Secure Messaging

Popular instant messaging applications such as WhatsApp and Signal provi...
research
12/07/2017

Enabling the Remote Acquisition of Digital Forensic Evidence through Secure Data Transmission and Verification

Providing the ability to any law enforcement officer to remotely transfe...
research
03/20/2020

Efficient Oblivious Database Joins

A major algorithmic challenge in designing applications intended for sec...
research
03/16/2020

Formal Methods Analysis of the Secure Remote Password Protocol

We analyze the Secure Remote Password (SRP) protocol for structural weak...
research
03/07/2022

Secure and Authorized Client-to-Client Communication for LwM2M

Constrained devices on the Internet of Things (IoT) continuously produce...

Please sign up or login with your details

Forgot password? Click here to reset