题名 | SoK: Understanding Designs Choices and Pitfalls of Trusted Execution Environments |
作者 | |
DOI | |
发表日期 | 2024-07-01
|
会议名称 | 19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024
|
ISBN | 9798400704826
|
会议录名称 | |
页码 | 1600-1616
|
会议日期 | July 1, 2024 - July 5, 2024
|
会议地点 | Singapore, Singapore
|
会议录编者/会议主办者 | ACM SIGSAC
|
出版地 | 1601 Broadway, 10th Floor, NEW YORK, NY, UNITED STATES
|
出版者 | |
摘要 | Trusted execution environment (TEE) is a revolutionary technology that enables secure remote execution (SRE) of cloud workloads on untrusted server-side computing platforms. Both commercial and academic TEEs have been proposed in the past few years, including Intel’s SGX and TDX, AMD’s SEV, ARM’s CCA, IBM’s PEF, and their academic counterparts built atop open-source RISC-V processors, such as Keystone, Sanctum, CURE, and Penglai. While great efforts from both sides have been made in developing a confidential computing ecosystem, the existence of server-side TEEs with drastically different designs and the presence of various known attacks have significantly increased the difficulty of understanding TEE designs and the reasons behind existing attacks. This paper offers a structured analysis of the design choices of server-side TEEs, focusing on dissecting TEE designs and identifying their potential pitfalls. We introduce the TEE Runtime Architectural Framework (TRAF), a detailed framework that facilitates a thorough and methodical dissection of TEE designs by analyzing the high-level considerations made by TEE designs. A key aspect of TRAF’s analysis is the reconfiguration of resource management in TEE designs, where the host OS used to have full control. By incorporating the Trusted Computing Base (TCB), TEE designs adopt different design choices on how to divide and coordinate tasks between the host OS and TCB to achieve security and effective management of computational resources. TRAF specifically investigates how common resources, such as CPU, memory, and I/O devices, are managed jointly by the TCB and host OS. This includes a focused study of factors that influence design choices, such as TCB size, performance, and efficiency. Furthermore, by examining existing vulnerabilities and attacks on TEEs, the paper further evaluates the security impact of varied design choices. © 2024 Copyright held by the owner/author(s). |
关键词 | |
学校署名 | 其他
|
语种 | 英语
|
相关链接 | [来源记录] |
收录类别 | |
资助项目 | Yinqian Zhang is supported in part by Key Special Project of the National Key Research and Development Program No. 2023YFB4503902, National Natural Science Foundation of China No. 62361166633 and Shenzhen Science and Technology Program No. JSGG2022083109560 3007. This work was also funded in part by the Air Force Office of Scientific Research (AFOSR) under grants FA9550-22-1-0511.
|
WOS研究方向 | Computer Science
; Telecommunications
|
WOS类目 | Computer Science, Information Systems
; Computer Science, Interdisciplinary Applications
; Telecommunications
|
WOS记录号 | WOS:001283918100112
|
EI入藏号 | 20243016754228
|
EI主题词 | Dissection
; Hardware security
|
EI分类号 | Medicine and Pharmacology:461.6
; Data Processing and Image Processing:723.2
|
来源库 | EV Compendex
|
引用统计 | |
成果类型 | 会议论文 |
条目标识符 | http://sustech.caswiz.com/handle/2SGJ60CL/794456 |
专题 | 工学院_斯发基斯可信自主研究院 南方科技大学 工学院_计算机科学与工程系 |
作者单位 | 1.Massachusetts Institute of Technology, Cambridge; MA, United States 2.Shanghai Jiao Tong University, Shanghai, China 3.Southern University of Science and Technology, Shenzhen, China 4.Research Institute of Trustworthy Autonomous Systems, The Department of Computer Science and Engineering, Southern University of Science and Technology (SUSTech), China |
推荐引用方式 GB/T 7714 |
Li, Mengyuan,Yang, Yuheng,Chen, Guoxing,et al. SoK: Understanding Designs Choices and Pitfalls of Trusted Execution Environments[C]//ACM SIGSAC. 1601 Broadway, 10th Floor, NEW YORK, NY, UNITED STATES:Association for Computing Machinery, Inc,2024:1600-1616.
|
条目包含的文件 | 条目无相关文件。 |
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论