Synergia: Hardening High-Assurance Security Systems with Confidential and Trusted Computing

05/12/2022
by   Wojciech Ozga, et al.
0

High-assurance security systems require strong isolation from the untrusted world to protect the security-sensitive or privacy-sensitive data they process. Existing regulations impose that such systems must execute in a trustworthy operating system (OS) to ensure they are not collocated with untrusted software that might negatively impact their availability or security. However, the existing techniques to attest to the OS integrity fall short due to the cuckoo attack. In this paper, we first show a novel defense mechanism against the cuckoo attack, and we formally prove it. Then, we implement it as part of an integrity monitoring and enforcement framework that attests to the trustworthiness of the OS from 3.7x to 8.5x faster than the existing integrity monitoring systems. We demonstrate its practicality by protecting the execution of a real-world eHealth application, performing micro and macro-benchmarks, and assessing the security risk.

READ FULL TEXT

page 2

page 5

page 6

page 8

research
12/01/2019

Zero knowledge proofs for cloud storage integrity checking

With the wide application of cloud storage, cloud security has become a ...
research
07/17/2017

Downgrade Attack on TrustZone

Security-critical tasks require proper isolation from untrusted software...
research
12/10/2019

V0LTpwn: Attacking x86 Processor Integrity from Software

Fault-injection attacks have been proven in the past to be a reliable wa...
research
01/05/2021

A practical approach for updating an integrity-enforced operating system

Trusted computing defines how to securely measure, store, and verify the...
research
12/27/2018

Sanctorum: A lightweight security monitor for secure enclaves

Enclaves have emerged as a particularly compelling primitive to implemen...
research
10/23/2020

Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX

Since its debut, SGX has been used in many applications, e.g., secure da...
research
08/29/2017

Nonmalleable Information Flow: Technical Report

Noninterference is a popular semantic security condition because it offe...

Please sign up or login with your details

Forgot password? Click here to reset