论文标题

Bao-Acclave:ARM的基于虚拟化的飞地

Bao-Enclave: Virtualization-based Enclaves for Arm

论文作者

Pereira, Samuel, Sousa, Joao, Pinto, Sandro, Martins, José, Cerdeira, David

论文摘要

通用操作系统(GPO),例如Linux,包括数百万行代码。从统计学上讲,较大的代码基础不可避免地会导致更高数量的潜在漏洞,并且本质上是一个更脆弱的系统。为了最大程度地减少GPO中漏洞的影响,在GPO域之外(即在受信任的执行环境(TEE))之外实施对安全敏感的程序已成为常见的问题。 ARM Trustzone是用于在ARM设备中实现TEE的事实上的技术。但是,在过去的十年中,T恤已成功攻击了数百次。不幸的是,由于基于TrustZone的T恤中存在几个建筑和实施缺陷,因此可能发生了这些攻击。在本文中,我们提出了基于虚拟化的解决方案Bao-Acclave,它使OEM能够从TEE中删除安全功能,并将其移至正常的世界隔离环境中,以轻质虚拟机(VMS)的形式受到潜在恶意OS的保护。我们在真实硬件平台上评估了Bao-clave,并发现Bao-clave可能会提高对安全敏感工作负载的性能,最多可提高4.8倍,而显着简化了TEE Tee Software TCB。

General-purpose operating systems (GPOS), such as Linux, encompass several million lines of code. Statistically, a larger code base inevitably leads to a higher number of potential vulnerabilities and inherently a more vulnerable system. To minimize the impact of vulnerabilities in GPOS, it has become common to implement security-sensitive programs outside the domain of the GPOS, i.e., in a Trusted Execution Environment (TEE). Arm TrustZone is the de-facto technology for implementing TEEs in Arm devices. However, over the last decade, TEEs have been successfully attacked hundreds of times. Unfortunately, these attacks have been possible due to the presence of several architectural and implementation flaws in TrustZone-based TEEs. In this paper, we propose Bao-Enclave, a virtualization-based solution that enables OEMs to remove security functionality from the TEE and move them into normal world isolated environments, protected from potentially malicious OSes, in the form of lightweight virtual machines (VMs). We evaluate Bao-Enclave on real hardware platforms and find out that Bao-Enclave may improve the performance of security-sensitive workloads by up to 4.8x, while significantly simplifying the TEE software TCB.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源