Protecting File Activities via Deception for ARM TrustZone

05/22/2022
by   Liwei Guo, et al.
0

A TrustZone TEE often invokes an external filesystem. While filedata can be encrypted, the revealed file activities can leak secrets. To hide the file activities from the filesystem and its OS, we propose Enigma, a deception-based defense injecting sybil file activities as the cover of the actual file activities. Enigma contributes three new designs. (1) To make the deception credible, the TEE generates sybil calls by replaying file calls from the TEE code under protection. (2) To make sybil activities cheap, the TEE requests the OS to run K filesystem images simultaneously. Concealing the disk, the TEE backs only one image with the actual disk while backing other images by only storing their metadata. (3) To protect filesystem image identities, the TEE shuffles the images frequently, preventing the OS from observing any image for long. Enigma works with unmodified filesystems shipped withLinux. On a low-cost Arm SoC with EXT4 and F2FS, our system can concurrently run as many as 50 filesystem images with 1 common obfuscation for hiding addresses in a flat space, Enigma hides file activities with richer semantics. Its cost is lower by one order of magnitude while achieving the same level of probabilistic security guarantees.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/02/2018

DurableFS: A File System for Persistent Memory

With the availability of hybrid DRAM-NVRAM memory on the memory bus of C...
research
08/17/2018

Bitstream-Based JPEG Image Encryption with File-Size Preserving

An encryption scheme of JPEG images in the bitstream domain is proposed....
research
10/26/2021

BuffetFS: Serve Yourself Permission Checks without Remote Procedure Calls

The remote procedure call (a.k.a. RPC) latency becomes increasingly sign...
research
12/20/2022

CoCoMIC: Code Completion By Jointly Modeling In-file and Cross-file Context

While pre-trained language models (LM) for code have achieved great succ...
research
08/28/2019

Kernel/User-level Collaborative Persistent Memory File System with Efficiency and Protection

Emerging high performance non-volatile memories recall the importance of...
research
01/09/2022

Camera-Model Identification Using Encoding and Container Characteristics of Video Files

We introduce a new method for camera-model identification. Our approach ...
research
09/03/2020

Exploratory Analysis of File System Metadata for Rapid Investigation of Security Incidents

Investigating cybersecurity incidents requires in-depth knowledge from t...

Please sign up or login with your details

Forgot password? Click here to reset