ImageVerifierCode 换一换
格式:PDF , 页数:34 ,大小:1.13MB ,
资源ID:1076133      下载积分:8 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 微信支付   
验证码:   换一换

加入VIP,免费下载资源
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.wodocx.com/d-1076133.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(4、TwinVisor:HardwareisolatedConfidentialVirtualMachinesforARM.pdf)为本站会员(精***)主动上传,沃文网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知沃文网(发送邮件至2622162128@qq.com或直接QQ联系客服),我们立即给予删除!

4、TwinVisor:HardwareisolatedConfidentialVirtualMachinesforARM.pdf

1、TwinVisor:Hardware-isolated Confidential Virtual Machines for ARM糜泽羽上海交通大学并行与分布式系统研究所(IPADS)https:/ computing grows rapidlyTenants are entrusting data with cloudData breach is a daily occurrenceE.g.,Azures cloud database breached in 20201Data Security in Cloud is Important1https:/msrc- 2025,50%of la

2、rge organizations will adopt privacy-enhancing computation for processing data in untrusted environments and multiparty data analytics use cases.”-Gartner上海交通大学并行与分布式系统研究所(IPADSSJTU)Hardware-isolated environments Data is only visible to authorized codeConfidential Computing is Emerging上海交通大学并行与分布式系统

3、研究所(IPADSSJTU)Hardware-isolated environments Data is only visible to authorized codeSecure enclaves are deployed in cloud Application-level confidential computing E.g.,Azure SQL database1based on Intel SGXConfidential Computing is EmergingContainerKernelCodeDataHardwareAPPEnclave1https:/ of Confiden

4、tial Hardware5IntelAMDARMAnnounce SGX2014SGX is available(6-gen core)20152016AnnounceSGXv22019SGXv2 isavailable2020AnnounceTDX2021TDXScalable SGXSEV&SME20162017SEV-ES2020AnnounceSEV-SNP2021SEV-SNP isavailableTrustZone20042017Secure-EL22021ARM CCA上海交通大学并行与分布式系统研究所(IPADSSJTU)OS-level confidential comp

5、utingProtect both kernel and user modesConfidential VM has gained traction Good compatibility with IaaS Minimal intrusiveness to workload Clear security boundaryConfidential VM in CloudGoogle CloudConfidential VMMicrosoftAzure Confidential ComputingIBM Hybrid Cloud上海交通大学并行与分布式系统研究所(IPADSSJTU)Existin

6、g Confidential VM SolutionsSpecialized hardware+Shared hypervisorHypervisorDRAMVM 0Mem Controller0VM 11VMVMHypervisorDRAMVM 0TDX Module0VM 11VMVMHypervisorDRAMVM 0UltravisorVM 1VMVMAMD SEV(x86):-Dedicated secure processorIntel TDX(x86):-Hardware shim layer-Microcode:TDX moduleIBM PEF(Power):-Additio

7、nal privilege level-Software:Ultravisor上海交通大学并行与分布式系统研究所(IPADSSJTU)Intel Trusted Domain Extensions(TDX)Shield VMs(TD)from any other non-TD software Virtual Machine Extensions(VMX)Multi-key,total memory-encryption(MKTME)technology CPU-attested,software moduleTDX protects the TDs with physical attacks

8、 Cold-boot attacks Memory relocating,splicing,and aliasing attacks Not defend against replay attack8HypervisorDRAMVM 0TDX Module0VM 11VMVM上海交通大学并行与分布式系统研究所(IPADSSJTU)Why ARM becomes popular in cloud?Rich ecosystem Excellent price-performance ratioDo ARM users care about the security of their data?Of

9、 course they do!Confidential VMs on ARM:no available solution yetWhen and how ARM servers will support confidential VMs?ARM Rises in Cloud Computing上海交通大学并行与分布式系统研究所(IPADSSJTU)ARM Confidential Compute Architecture10ARMv9s solution to the future needs of securityExpand to four world states Non-secure

10、,Realm,secure,rootSecure monitorVMMOSAPPAPPTEEOSSEL2RMMOSAPPRealmNon-secureSecureRootNon-secureMemRealmMemSecureMemRootMemNon-secureRealmSecureRoot上海交通大学并行与分布式系统研究所(IPADSSJTU)CCA Software Architecture11Secure MonitorIsolationRealm mgt.AttestationCryptoRMMAppServiceRealmOSRealmVMHypervisorVMAppOSSecu

11、re PlatformManagerTATEEOSTATEEOSRealmNon-secureSecure上海交通大学并行与分布式系统研究所(IPADSSJTU)Twinvisor:ARM Secure VMbased on TrustZone(SOSP 2021)12上海交通大学并行与分布式系统研究所(IPADSSJTU)ARM TrustZone&Secure-EL2(S-EL2)extensionTrustZone:isolated from the normal world,widely used on mobile platformsS-EL2 enables hardware vi

12、rtualization in TrustZone since ARMv8.4 S-EL2 mirrors N-EL2ARM TrustZone&S-EL2Region-based memory isolation-Up to 8 regions(TZC-400)-Configured by EL3&S-EL2FirmwareHypervisorAPPsKernelS-EL0S-EL1S-EL2HypervisorAPPsKernelNormal WorldWith S-EL2N-EL0N-EL1N-EL2EL3SMCSMCDRAMTATEE-KernelSecure WorldWithout

13、 S-EL2TA上海交通大学并行与分布式系统研究所(IPADSSJTU)ARM TrustZone&Secure-EL2(S-EL2)extensionTrustZone:isolated from the normal world,widely used on mobile platformsS-EL2 enables hardware virtualization in TrustZone since ARMv8.4 S-EL2 mirrors N-EL2ARM TrustZone&S-EL2Region-based memory isolation-Up to 8 regions(TZC

14、-400)-Configured by EL3&S-EL2FirmwareHypervisorAPPsKernelS-EL0S-EL1S-EL2HypervisorAPPsKernelNormal WorldWith S-EL2N-EL0N-EL1N-EL2EL3SMCSMCDRAMTATEE-KernelSecure WorldWithout S-EL2TAIs it possible to retrofit TrustZonewith new software designs?上海交通大学并行与分布式系统研究所(IPADSSJTU)TrustZone-style:Another Dedic

15、ated HypervisorA straightforward design:A dedicated full-fledged hypervisor for secure VMs(S-VMs)in TrustZoneTCB:the hypervisor in S-EL2上海交通大学并行与分布式系统研究所(IPADSSJTU)A straightforward design:A dedicated full-fledged hypervisor for secure VMs(S-VMs)in TrustZoneTCB:the hypervisor in S-EL2Lessons from co

16、mmercial hypervisors and TEE-Kernels Born:small TCB,high-security guarantee Evolved:bloated TCB,numerous vulnerabilities&attack surfacesRepresentative KVM CVEs in recent five yearsRepresentative TEE system CVEs上海交通大学并行与分布式系统研究所(IPADSSJTU)TrustZone-style:Another Dedicated HypervisorOur Design:TwinVis

17、orKey observationMature hypervisors already exist in the normal worldDisentangle the management from the protectionProtectionS-VMS-EL0&1S-EL2Normal WorldN-EL0&1N-EL2EL3Secure WorldUntrustedTrustedN-VMN-VMS-VMS-visorN-visorResourceManagementFirmware上海交通大学并行与分布式系统研究所(IPADSSJTU)Our Design:TwinVisorKey

18、observationMature hypervisors already exist in the normal worldDisentangle the management from the protectionPhysical attacks,Side-channel,DoSUntrusted software-Device vendors providehardware-backed attestation-S-VMs protect their I/O dataProtectionS-VMS-EL0&1S-EL2Normal WorldN-EL0&1N-EL2EL3Secure W

19、orldUntrustedTrustedN-VMN-VMS-VMS-visorN-visorResourceManagementFirmware上海交通大学并行与分布式系统研究所(IPADSSJTU)Design Goals1.SecurityProtecting S-VMs from untrusted softwareKeeping the TCB small2.EfficiencyComparable performance and scalability to Vanilla3.Minimal modificationsMinor modifications to existing s

20、oftware上海交通大学并行与分布式系统研究所(IPADSSJTU)Challenges of Existing TrustZone1.Independent privilege modelsNo transparent trap-and-emulateIdealRealityS-visorN-visorIndependentPrivilegeS-visorN-visorHighPrivilegeLowPrivilege上海交通大学并行与分布式系统研究所(IPADSSJTU)Challenges of Existing TrustZone1.Independent privilege mod

21、elsNo transparent trap-and-emulate2.Static resource partitionsInsufficient resource/Low utilizationDRAMRegionA limited number ofcontiguous regionsDRAMUnlimited fine-grainedsecure memoryIdealRealityIdealRealityS-visorN-visorIndependentPrivilegeS-visorN-visorHighPrivilegeLowPrivilege上海交通大学并行与分布式系统研究所(

22、IPADSSJTU)Challenges of Existing TrustZone1.Independent privilege modelsNo transparent trap-and-emulate2.Static resource partitionsInsufficient resource/Low utilization3.Slow world switchesMuch runtime overhead for S-VMsIdealRealityS-visorN-visorIndependentPrivilegeS-visorN-visorHighPrivilegeLowPriv

23、ilegeDRAMRegionA limited number ofcontiguous regionsDRAMUnlimited fine-grainedsecure memoryN-visorInfrequent TA callsTEE OSS-visorFrequent VM exitsN-visorS-VMS-visorExpectedRealityIdealReality上海交通大学并行与分布式系统研究所(IPADSSJTU)Problems of dynamic secure memory by the S-visorDiscrete secure memory pages vs.

24、Limited contiguous secure memory regionsN-visors unaware of security changesAdjust Resource DynamicallyNo more regionSecureSecureLow utilizationS-VMN-visorSecureSecureNew secure page上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep se

25、cure memory contiguous+Cooperative managementCooperative Resources ManagementSecureN-VMN-visorS-visor#S2PFS-VM 0S-VM 1上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative managementCooperative Resourc

26、es ManagementSecureN-VMN-visorS-visor#S2PFS-VM 0S-VM 1S-VM 0S-VM 1MigrateN-visorS-visorN-VMSecure上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative managementCooperative Resources ManagementSecureN-

27、VMN-visorS-visor#S2PFS-VM 0S-VM 1S-VM 0S-VM 1N-visorS-visorN-VMSecureEnlarge securememory regionS-VM 0S-VM 1MigrateN-visorS-visorN-VMSecure上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative manageme

28、ntCooperative Resources ManagementS-VM 0N-visorS-visorN-VMSecureN-VMNormal memorynot enough上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative managementCooperative Resources ManagementS-VM 0N-visorS

29、-visorN-VMSecureN-VMNormal memorynot enoughS-VM 0N-visorS-visorN-VMN-VMCompaction上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative managementCooperative Resources ManagementS-VM 0N-visorS-visorN-VM

30、SecureN-VMNormal memorynot enoughS-VM 0N-visorS-visorN-VMN-VMResize securememory regionSecureS-VM 0N-visorS-visorN-VMN-VMCompaction上海交通大学并行与分布式系统研究所(IPADSSJTU)Implementation:PrototypesFunctional evaluationOfficial simulator:ARM Fixed Virtual Platform(FVP)with S-EL2 enabledPerformance evaluationReal

31、hardware:Hisilicon Kirin 990 development board(ARMv8.2)N-EL2 and Virtualization Host Extension(VHE)Work similarly to the S-EL2 enabled hardware上海交通大学并行与分布式系统研究所(IPADSSJTU)Implementation:PrototypesFunctional evaluationOfficial simulator:ARM Fixed Virtual Platform(FVP)with S-EL2 enabledPerformance eva

32、luationReal hardware:Hisilicon Kirin 990 development board(ARMv8.2)N-EL2 and Virtualization Host Extension(VHE)Work similarly to the S-EL2 enabled hardwareThe code size of the prototype system of TwinVisor上海交通大学并行与分布式系统研究所(IPADSSJTU)Performance EvaluationDevelopment boardHisilicon Kirin 990(ARMv8.2)

33、+8GB RAM+256GB ROM Only enable 4 Cortex-A55 cores(1.95 GHz)to avoid performance instabilityNetwork setupClient:Ubuntu-18.04 VM+6-core Intel i7-8700 CPU+32GB RAMTethering the board and the Ubuntu VM through USB Type-COther configurationFirmware in EL3:Trusted Firmware-A(TF-A)v1.5N-visor:Linux kernel

34、4.14+QEMU v4.2.0N-VMs&S-VMs:Linux kernel 4.15+8GB disk image上海交通大学并行与分布式系统研究所(IPADSSJTU)1-vCPU4-vCPU8-vCPUReal-world Application PerformanceNormalized performance of an S-VM compared with VanillaMaximum average overhead 5%Small overhead:world switches occupy merely a small proportion of applications

35、 effective execution time*512MB memory and different vCPUs(8-vCPU CPU oversubscription)ConclusionEnable hardware-isolated confidential VM on ARM platformsRetrofit existing TrustZone with software designsDecouple protection from managementH-trap,split CMA,fast switchAchieve comparable performance to VanillaLess than 5%overhead for all applications on SMP VMsProvide design references for future systemsE.g.,dual-hypervisor systems atop ARM CCAThanks!Open-source prototype:https:/

版权声明:以上文章中所选用的图片及文字来源于网络以及用户投稿,由于未联系到知识产权人或未发现有关知识产权的登记,如有知识产权人并不愿意我们使用,如有侵权请立即联系:2622162128@qq.com ,我们立即下架或删除。

Copyright© 2022-2024 www.wodocx.com ,All Rights Reserved |陕ICP备19002583号-1 

陕公网安备 61072602000132号     违法和不良信息举报:0916-4228922