MI6: Secure Enclaves in a Speculative Out-of-Order Processor

12/24/2018
by   Thomas Bourgeat, et al.
0

Recent attacks have broken process isolation by exploiting microarchitectural side channels that allow indirect access to shared microarchitectural state. Enclaves strengthen the process abstraction to restore isolation guarantees. We propose MI6, an aggressive, speculative out-of-order processor capable of providing secure enclaves under a threat model that includes an untrusted OS and an attacker capable of mounting any software attack currently considered practical, including control flow speculation attacks. MI6 is inspired by Sanctum [16] and extends its isolation guarantee to more realistic memory hierarchies. It also introduces a purge instruction, which is used only when a secure process is scheduled, and implements it for a complex processor microarchitecture. We model the performance impact of enclaves in MI6 through FPGA emulation on AWS F1 FPGAs by running SPEC CINT2006 benchmarks on top of an untrusted Linux OS. Security comes at the cost of approximately 16.4 slowdown for protected programs.

READ FULL TEXT

page 10

page 11

research
06/26/2023

Citadel: Enclaves with Strong Microarchitectural Isolation and Secure Shared Memory on a Speculative Out-of-Order Processor

We present Citadel, to our knowledge, the first enclave platform with st...
research
09/08/2017

FreeGuard: A Faster Secure Heap Allocator

In spite of years of improvements to software security, heap-related att...
research
02/23/2023

ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)

We propose ProSpeCT, a generic formal processor model providing provably...
research
12/28/2020

Contract-Aware Secure Compilation

Microarchitectural attacks exploit the abstraction gap between the Instr...
research
12/26/2018

Secure Estimation under Causative Attacks

This paper considers the problem of secure parameter estimation when the...
research
04/29/2019

IRONHIDE: A Secure Multicore that Efficiently Mitigates Microarchitecture State Attacks for Interactive Applications

Microprocessors enable aggressive hardware virtualization by means of wh...
research
08/08/2021

The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization

Commodity applications contain more and more combinations of interacting...

Please sign up or login with your details

Forgot password? Click here to reset