【24h】

Migrating SGX Enclaves with Persistent State

机译:迁移具有持久状态的SGX飞地

获取原文

摘要

Hardware-supported security mechanisms like Intel Software Guard Extensions (SGX) provide strong security guarantees, which are particularly relevant in cloud settings. However, their reliance on physical hardware conflicts with cloud practices, like migration of VMs between physical platforms. For instance, the SGX trusted execution environment (enclave) is bound to a single physical CPU. Although prior work has proposed an effective mechanism to migrate an enclave's data memory, it overlooks the migration of persistent state, including sealed data and monotonic counters; the former risks data loss whilst the latter undermines the SGX security guarantees. We show how this can be exploited to mount attacks, and then propose an improved enclave migration approach guaranteeing the consistency of persistent state. Our software-only approach enables migratable sealed data and monotonic counters, maintains all SGX security guarantees, minimizes developer effort, and incurs negligible performance overhead.
机译:硬件支持的安全机制,例如英特尔软件防护扩展(SGX),提供了强大的安全保证,这在云设置中尤其重要。但是,它们对物理硬件的依赖与云实践(例如,虚拟机在物理平台之间的迁移)发生冲突。例如,SGX受信任的执行环境(安全区)绑定到单个物理CPU。尽管先前的工作提出了一种迁移飞地数据存储的有效机制,但它忽略了持久状态的迁移,包括密封数据和单调计数器。前者冒着数据丢失的风险,而后者则破坏了新交所的安全保证。我们展示了如何利用它来发动攻击,然后提出一种改进的飞地迁移方法,以保证持久状态的一致性。我们的纯软件方法可实现可迁移的密封数据和单调计数器,维护所有SGX安全保证,最大程度地减少开发人员的工作量,并产生可忽略的性能开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号