WELES: Policy-driven Runtime Integrity Enforcement of Virtual Machines

by   Wojciech Ozga, et al.

Trust is of paramount concern for tenants to deploy their security-sensitive services in the cloud. The integrity of VMs in which these services are deployed needs to be ensured even in the presence of powerful adversaries with administrative access to the cloud. Traditional approaches for solving this challenge leverage trusted computing techniques, e.g., vTPM, or hardware CPU extensions, e.g., AMD SEV. But, they are vulnerable to powerful adversaries, or they provide only load time (not runtime) integrity measurements of VMs. We propose WELES, a protocol allowing tenants to establish and maintain trust in VM runtime integrity of software and its configuration. WELES is transparent to the VM configuration and setup. It performs an implicit attestation of VMs during a secure login and binds the VM integrity state with the secure connection. Our prototype's evaluation shows that WELES is practical and incurs low performance overhead.


page 1

page 2

page 3

page 4


Scanclave: Verifying Application Runtime Integrity in Untrusted Environments

Data hosted in a cloud environment can be subject to attacks from a high...

Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine Stakeholders

Trust is arguably the most important challenge for critical services bot...

Secure Boot from Non-Volatile Memory for Programmable SoC Architectures

In modern embedded systems, the trust in comprehensive security standard...

n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications

Web servers are a popular target for adversaries as they are publicly ac...

Walnut: A low-trust trigger-action platform

Trigger-action platforms are a new type of system that connect IoT devic...

EPA-RIMM: A Framework for Dynamic SMM-based Runtime Integrity Measurement

Runtime integrity measurements identify unexpected changes in operating ...

BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains

With the rapidly evolving next-generation systems-of-systems, we face ne...