A keystone extension to defend against cache timing attacks

Kai Nie, Rongcai Zhao, Xiao Zhang, Haoyang Chai
{"title":"A keystone extension to defend against cache timing attacks","authors":"Kai Nie, Rongcai Zhao, Xiao Zhang, Haoyang Chai","doi":"10.1117/12.3032012","DOIUrl":null,"url":null,"abstract":"Trusted Execution Environment (TEE) find extensive applications in various scenarios such as secure cloud services, databases, big data computing, and blockchain. They establish a secure operational zone, often referred to as an Enclave, for applications. The Keystone Trusted Execution Environment offers a range of security primitives, including memory isolation, secure boot, and remote authentication. It stands out as the first open-source framework under the RISC-V architecture designed for constructing customized TEEs and is currently the mainstream TEE in the RISC-V architecture. However, Keystone itself does not provide protection for Enclaves or security monitors against Cache timing attacks. Recent research has demonstrated that malicious actors, leveraging Spectre attacks, can use Cache timing attack techniques to detect Enclave data through shared caches. This paper proposes a Keystone extension design, calling the extended framework Keyson-LLCI (Last Leavel Cache Isolation). Through security analysis, we prove that it can isolate enclaves and operating systems into different cache paths at the LLC level, thus eliminating the influence of cache side channels and increasing the isolation and security of enclaves. We implemented this hardware extension on an FPGA development board and conducted performance testing and IOZone testing. The test results indicate that Keystone-LLCI can effectively defend against Cache timing attacks, with a performance loss of approximately 14%. The latency of read and write operations increased by 12.4% and 14.1%, respectively. It represents an extension design with relatively low performance loss.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Other Conferences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.3032012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Trusted Execution Environment (TEE) find extensive applications in various scenarios such as secure cloud services, databases, big data computing, and blockchain. They establish a secure operational zone, often referred to as an Enclave, for applications. The Keystone Trusted Execution Environment offers a range of security primitives, including memory isolation, secure boot, and remote authentication. It stands out as the first open-source framework under the RISC-V architecture designed for constructing customized TEEs and is currently the mainstream TEE in the RISC-V architecture. However, Keystone itself does not provide protection for Enclaves or security monitors against Cache timing attacks. Recent research has demonstrated that malicious actors, leveraging Spectre attacks, can use Cache timing attack techniques to detect Enclave data through shared caches. This paper proposes a Keystone extension design, calling the extended framework Keyson-LLCI (Last Leavel Cache Isolation). Through security analysis, we prove that it can isolate enclaves and operating systems into different cache paths at the LLC level, thus eliminating the influence of cache side channels and increasing the isolation and security of enclaves. We implemented this hardware extension on an FPGA development board and conducted performance testing and IOZone testing. The test results indicate that Keystone-LLCI can effectively defend against Cache timing attacks, with a performance loss of approximately 14%. The latency of read and write operations increased by 12.4% and 14.1%, respectively. It represents an extension design with relatively low performance loss.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
抵御缓存定时攻击的 Keystone 扩展
可信执行环境(TEE)广泛应用于各种场景,如安全云服务、数据库、大数据计算和区块链。它们为应用程序建立了一个安全运行区,通常称为 "飞地"(Enclave)。Keystone 可信执行环境提供了一系列安全基元,包括内存隔离、安全启动和远程验证。它是 RISC-V 架构下首个专为构建定制 TEE 而设计的开源框架,也是目前 RISC-V 架构中的主流 TEE。然而,Keystone 本身并不为 Enclaves 提供保护,也不提供针对高速缓存定时攻击的安全监控。最近的研究表明,恶意行为者利用 Spectre 攻击,可以使用高速缓存定时攻击技术,通过共享高速缓存检测 Enclave 数据。本文提出了一种 Keystone 扩展设计,将扩展框架称为 Keyson-LLCI (Last Leavel Cache Isolation)。通过安全分析,我们证明它可以在 LLC 层将飞地和操作系统隔离到不同的缓存路径中,从而消除缓存侧信道的影响,提高飞地的隔离度和安全性。我们在 FPGA 开发板上实现了这一硬件扩展,并进行了性能测试和 IOZone 测试。测试结果表明,Keystone-LLCI 可以有效抵御高速缓存时序攻击,性能损失约为 14%。读取和写入操作的延迟分别增加了 12.4% 和 14.1%。这是一种性能损失相对较低的扩展设计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Small data in model calibration for optical tissue phantom validation New approaches of supersmooth surfaces diagnostics by using carbon nanoparticles Uses of 3D printing technologies in opto-mechanics and opto-mechatronics for laboratory instruments Integrated approach to precision instrumentation: design, modeling, and experimental validation of a compliant mechanical amplifier for laser scalpel prototype Laser-induced periodic surface structures on TiAl6V4 surfaces by picosecond laser processing for dental abutments
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1