Stockade: Hardware Hardening for Distributed Trusted Sandboxes

08/26/2021
by   Joongun Park, et al.
0

The widening availability of hardware-based trusted execution environments (TEEs) has been accelerating the adaptation of new applications using TEEs. Recent studies showed that a cloud application consists of multiple distributed software modules provided by mutually distrustful parties. The applications use multiple TEEs (enclaves) communicating through software-encrypted memory channels. Such execution model requires bi-directional protection: protecting the rest of the system from the enclave module with sandboxing and protecting the enclave module from a third-part module and operating systems. However, the current TEE model, such as Intel SGX, cannot efficiently represent such distributed sandbox applications. To overcome the lack of hardware supports for sandboxed TEEs, this paper proposes an extended enclave model called Stockade, which supports distributed sandboxes hardened by hardware. Stockade proposes new three key techniques. First, it extends the hardware-based memory isolation in SGX to confine a user software module only within its enclave. Second, it proposes a trusted monitor enclave that filters and validates systems calls from enclaves. Finally, it allows hardware-protected memory sharing between a pair of enclaves for efficient protected communication without software-based encryption. Using an emulated SGX platform with the proposed extensions, this paper shows that distributed sandbox applications can be effectively supported with small changes of SGX hardware.

READ FULL TEXT

page 1

page 3

page 5

page 8

page 9

page 12

page 13

page 14

research
03/29/2023

Remote attestation of SEV-SNP confidential VMs using e-vTPMs

Trying to address the security challenges of a cloud-centric software de...
research
04/20/2020

BAHULAM: Distributed Data Analytics on Secure Enclaves

This is a survey of some of the currently available frameworks (opensour...
research
10/24/2022

Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software

Trusted execution environments are quickly rising in popularity as they ...
research
04/01/2023

Scalable Attestation of Virtualized Execution Environments in Hybrid- and Multi-Cloud

Existing attestation mechanisms lack scalability and support for heterog...
research
05/06/2022

Private delegated computations using strong isolation

Sensitive computations are now routinely delegated to third-parties. In ...
research
08/12/2023

SGX-MR-Prot: Efficient and Developer-Friendly Access-Pattern Protection in Trusted Execution Environments

Trusted Execution Environments, such as Intel SGX, use hardware supports...
research
09/30/2022

Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing

Hardware enclaves rely on a disjoint memory model, which maps each physi...

Please sign up or login with your details

Forgot password? Click here to reset