欢迎来到沃文网! | 帮助中心 分享知识,传播智慧!
沃文网
全部分类
  • 教学课件>
  • 医学资料>
  • 技术资料>
  • 学术论文>
  • 资格考试>
  • 建筑施工>
  • 实用文档>
  • 其他资料>
  • ImageVerifierCode 换一换
    首页 沃文网 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    4、TwinVisor:HardwareisolatedConfidentialVirtualMachinesforARM.pdf

    • 资源ID:1076133       资源大小:1.13MB        全文页数:34页
    • 资源格式: PDF        下载积分:8积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    三方登录下载: QQ登录 微博登录
    二维码
    微信扫一扫登录
    下载资源需要8积分
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,下载更划算!
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    4、TwinVisor:HardwareisolatedConfidentialVirtualMachinesforARM.pdf

    1、TwinVisor:Hardware-isolated Confidential Virtual Machines for ARM糜泽羽上海交通大学并行与分布式系统研究所(IPADS)https:/ computing grows rapidlyTenants are entrusting data with cloudData breach is a daily occurrenceE.g.,Azures cloud database breached in 20201Data Security in Cloud is Important1https:/msrc- 2025,50%of la

    2、rge organizations will adopt privacy-enhancing computation for processing data in untrusted environments and multiparty data analytics use cases.”-Gartner上海交通大学并行与分布式系统研究所(IPADSSJTU)Hardware-isolated environments Data is only visible to authorized codeConfidential Computing is Emerging上海交通大学并行与分布式系统

    3、研究所(IPADSSJTU)Hardware-isolated environments Data is only visible to authorized codeSecure enclaves are deployed in cloud Application-level confidential computing E.g.,Azure SQL database1based on Intel SGXConfidential Computing is EmergingContainerKernelCodeDataHardwareAPPEnclave1https:/ of Confiden

    4、tial Hardware5IntelAMDARMAnnounce SGX2014SGX is available(6-gen core)20152016AnnounceSGXv22019SGXv2 isavailable2020AnnounceTDX2021TDXScalable SGXSEV&SME20162017SEV-ES2020AnnounceSEV-SNP2021SEV-SNP isavailableTrustZone20042017Secure-EL22021ARM CCA上海交通大学并行与分布式系统研究所(IPADSSJTU)OS-level confidential comp

    5、utingProtect both kernel and user modesConfidential VM has gained traction Good compatibility with IaaS Minimal intrusiveness to workload Clear security boundaryConfidential VM in CloudGoogle CloudConfidential VMMicrosoftAzure Confidential ComputingIBM Hybrid Cloud上海交通大学并行与分布式系统研究所(IPADSSJTU)Existin

    6、g Confidential VM SolutionsSpecialized hardware+Shared hypervisorHypervisorDRAMVM 0Mem Controller0VM 11VMVMHypervisorDRAMVM 0TDX Module0VM 11VMVMHypervisorDRAMVM 0UltravisorVM 1VMVMAMD SEV(x86):-Dedicated secure processorIntel TDX(x86):-Hardware shim layer-Microcode:TDX moduleIBM PEF(Power):-Additio

    7、nal privilege level-Software:Ultravisor上海交通大学并行与分布式系统研究所(IPADSSJTU)Intel Trusted Domain Extensions(TDX)Shield VMs(TD)from any other non-TD software Virtual Machine Extensions(VMX)Multi-key,total memory-encryption(MKTME)technology CPU-attested,software moduleTDX protects the TDs with physical attacks

    8、 Cold-boot attacks Memory relocating,splicing,and aliasing attacks Not defend against replay attack8HypervisorDRAMVM 0TDX Module0VM 11VMVM上海交通大学并行与分布式系统研究所(IPADSSJTU)Why ARM becomes popular in cloud?Rich ecosystem Excellent price-performance ratioDo ARM users care about the security of their data?Of

    9、 course they do!Confidential VMs on ARM:no available solution yetWhen and how ARM servers will support confidential VMs?ARM Rises in Cloud Computing上海交通大学并行与分布式系统研究所(IPADSSJTU)ARM Confidential Compute Architecture10ARMv9s solution to the future needs of securityExpand to four world states Non-secure

    10、,Realm,secure,rootSecure monitorVMMOSAPPAPPTEEOSSEL2RMMOSAPPRealmNon-secureSecureRootNon-secureMemRealmMemSecureMemRootMemNon-secureRealmSecureRoot上海交通大学并行与分布式系统研究所(IPADSSJTU)CCA Software Architecture11Secure MonitorIsolationRealm mgt.AttestationCryptoRMMAppServiceRealmOSRealmVMHypervisorVMAppOSSecu

    11、re PlatformManagerTATEEOSTATEEOSRealmNon-secureSecure上海交通大学并行与分布式系统研究所(IPADSSJTU)Twinvisor:ARM Secure VMbased on TrustZone(SOSP 2021)12上海交通大学并行与分布式系统研究所(IPADSSJTU)ARM TrustZone&Secure-EL2(S-EL2)extensionTrustZone:isolated from the normal world,widely used on mobile platformsS-EL2 enables hardware vi

    12、rtualization in TrustZone since ARMv8.4 S-EL2 mirrors N-EL2ARM TrustZone&S-EL2Region-based memory isolation-Up to 8 regions(TZC-400)-Configured by EL3&S-EL2FirmwareHypervisorAPPsKernelS-EL0S-EL1S-EL2HypervisorAPPsKernelNormal WorldWith S-EL2N-EL0N-EL1N-EL2EL3SMCSMCDRAMTATEE-KernelSecure WorldWithout

    13、 S-EL2TA上海交通大学并行与分布式系统研究所(IPADSSJTU)ARM TrustZone&Secure-EL2(S-EL2)extensionTrustZone:isolated from the normal world,widely used on mobile platformsS-EL2 enables hardware virtualization in TrustZone since ARMv8.4 S-EL2 mirrors N-EL2ARM TrustZone&S-EL2Region-based memory isolation-Up to 8 regions(TZC

    14、-400)-Configured by EL3&S-EL2FirmwareHypervisorAPPsKernelS-EL0S-EL1S-EL2HypervisorAPPsKernelNormal WorldWith S-EL2N-EL0N-EL1N-EL2EL3SMCSMCDRAMTATEE-KernelSecure WorldWithout S-EL2TAIs it possible to retrofit TrustZonewith new software designs?上海交通大学并行与分布式系统研究所(IPADSSJTU)TrustZone-style:Another Dedic

    15、ated HypervisorA straightforward design:A dedicated full-fledged hypervisor for secure VMs(S-VMs)in TrustZoneTCB:the hypervisor in S-EL2上海交通大学并行与分布式系统研究所(IPADSSJTU)A straightforward design:A dedicated full-fledged hypervisor for secure VMs(S-VMs)in TrustZoneTCB:the hypervisor in S-EL2Lessons from co

    16、mmercial hypervisors and TEE-Kernels Born:small TCB,high-security guarantee Evolved:bloated TCB,numerous vulnerabilities&attack surfacesRepresentative KVM CVEs in recent five yearsRepresentative TEE system CVEs上海交通大学并行与分布式系统研究所(IPADSSJTU)TrustZone-style:Another Dedicated HypervisorOur Design:TwinVis

    17、orKey observationMature hypervisors already exist in the normal worldDisentangle the management from the protectionProtectionS-VMS-EL0&1S-EL2Normal WorldN-EL0&1N-EL2EL3Secure WorldUntrustedTrustedN-VMN-VMS-VMS-visorN-visorResourceManagementFirmware上海交通大学并行与分布式系统研究所(IPADSSJTU)Our Design:TwinVisorKey

    18、observationMature hypervisors already exist in the normal worldDisentangle the management from the protectionPhysical attacks,Side-channel,DoSUntrusted software-Device vendors providehardware-backed attestation-S-VMs protect their I/O dataProtectionS-VMS-EL0&1S-EL2Normal WorldN-EL0&1N-EL2EL3Secure W

    19、orldUntrustedTrustedN-VMN-VMS-VMS-visorN-visorResourceManagementFirmware上海交通大学并行与分布式系统研究所(IPADSSJTU)Design Goals1.SecurityProtecting S-VMs from untrusted softwareKeeping the TCB small2.EfficiencyComparable performance and scalability to Vanilla3.Minimal modificationsMinor modifications to existing s

    20、oftware上海交通大学并行与分布式系统研究所(IPADSSJTU)Challenges of Existing TrustZone1.Independent privilege modelsNo transparent trap-and-emulateIdealRealityS-visorN-visorIndependentPrivilegeS-visorN-visorHighPrivilegeLowPrivilege上海交通大学并行与分布式系统研究所(IPADSSJTU)Challenges of Existing TrustZone1.Independent privilege mod

    21、elsNo transparent trap-and-emulate2.Static resource partitionsInsufficient resource/Low utilizationDRAMRegionA limited number ofcontiguous regionsDRAMUnlimited fine-grainedsecure memoryIdealRealityIdealRealityS-visorN-visorIndependentPrivilegeS-visorN-visorHighPrivilegeLowPrivilege上海交通大学并行与分布式系统研究所(

    22、IPADSSJTU)Challenges of Existing TrustZone1.Independent privilege modelsNo transparent trap-and-emulate2.Static resource partitionsInsufficient resource/Low utilization3.Slow world switchesMuch runtime overhead for S-VMsIdealRealityS-visorN-visorIndependentPrivilegeS-visorN-visorHighPrivilegeLowPriv

    23、ilegeDRAMRegionA limited number ofcontiguous regionsDRAMUnlimited fine-grainedsecure memoryN-visorInfrequent TA callsTEE OSS-visorFrequent VM exitsN-visorS-VMS-visorExpectedRealityIdealReality上海交通大学并行与分布式系统研究所(IPADSSJTU)Problems of dynamic secure memory by the S-visorDiscrete secure memory pages vs.

    24、Limited contiguous secure memory regionsN-visors unaware of security changesAdjust Resource DynamicallyNo more regionSecureSecureLow utilizationS-VMN-visorSecureSecureNew secure page上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep se

    25、cure memory contiguous+Cooperative managementCooperative Resources ManagementSecureN-VMN-visorS-visor#S2PFS-VM 0S-VM 1上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative managementCooperative Resourc

    26、es ManagementSecureN-VMN-visorS-visor#S2PFS-VM 0S-VM 1S-VM 0S-VM 1MigrateN-visorS-visorN-VMSecure上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative managementCooperative Resources ManagementSecureN-

    27、VMN-visorS-visor#S2PFS-VM 0S-VM 1S-VM 0S-VM 1N-visorS-visorN-VMSecureEnlarge securememory regionS-VM 0S-VM 1MigrateN-visorS-visorN-VMSecure上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative manageme

    28、ntCooperative Resources ManagementS-VM 0N-visorS-visorN-VMSecureN-VMNormal memorynot enough上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative managementCooperative Resources ManagementS-VM 0N-visorS

    29、-visorN-VMSecureN-VMNormal memorynot enoughS-VM 0N-visorS-visorN-VMN-VMCompaction上海交通大学并行与分布式系统研究所(IPADSSJTU)ObservationOSes are usually equipped with Contiguous Memory Allocator(CMA)Split CMAKeep secure memory contiguous+Cooperative managementCooperative Resources ManagementS-VM 0N-visorS-visorN-VM

    30、SecureN-VMNormal memorynot enoughS-VM 0N-visorS-visorN-VMN-VMResize securememory regionSecureS-VM 0N-visorS-visorN-VMN-VMCompaction上海交通大学并行与分布式系统研究所(IPADSSJTU)Implementation:PrototypesFunctional evaluationOfficial simulator:ARM Fixed Virtual Platform(FVP)with S-EL2 enabledPerformance evaluationReal

    31、hardware:Hisilicon Kirin 990 development board(ARMv8.2)N-EL2 and Virtualization Host Extension(VHE)Work similarly to the S-EL2 enabled hardware上海交通大学并行与分布式系统研究所(IPADSSJTU)Implementation:PrototypesFunctional evaluationOfficial simulator:ARM Fixed Virtual Platform(FVP)with S-EL2 enabledPerformance eva

    32、luationReal hardware:Hisilicon Kirin 990 development board(ARMv8.2)N-EL2 and Virtualization Host Extension(VHE)Work similarly to the S-EL2 enabled hardwareThe code size of the prototype system of TwinVisor上海交通大学并行与分布式系统研究所(IPADSSJTU)Performance EvaluationDevelopment boardHisilicon Kirin 990(ARMv8.2)

    33、+8GB RAM+256GB ROM Only enable 4 Cortex-A55 cores(1.95 GHz)to avoid performance instabilityNetwork setupClient:Ubuntu-18.04 VM+6-core Intel i7-8700 CPU+32GB RAMTethering the board and the Ubuntu VM through USB Type-COther configurationFirmware in EL3:Trusted Firmware-A(TF-A)v1.5N-visor:Linux kernel

    34、4.14+QEMU v4.2.0N-VMs&S-VMs:Linux kernel 4.15+8GB disk image上海交通大学并行与分布式系统研究所(IPADSSJTU)1-vCPU4-vCPU8-vCPUReal-world Application PerformanceNormalized performance of an S-VM compared with VanillaMaximum average overhead 5%Small overhead:world switches occupy merely a small proportion of applications

    35、 effective execution time*512MB memory and different vCPUs(8-vCPU CPU oversubscription)ConclusionEnable hardware-isolated confidential VM on ARM platformsRetrofit existing TrustZone with software designsDecouple protection from managementH-trap,split CMA,fast switchAchieve comparable performance to VanillaLess than 5%overhead for all applications on SMP VMsProvide design references for future systemsE.g.,dual-hypervisor systems atop ARM CCAThanks!Open-source prototype:https:/


    注意事项

    本文(4、TwinVisor:HardwareisolatedConfidentialVirtualMachinesforARM.pdf)为本站会员(精***)主动上传,沃文网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知沃文网(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服点击这里,给沃文网发消息,QQ:2622162128 - 联系我们

    版权声明:以上文章中所选用的图片及文字来源于网络以及用户投稿,由于未联系到知识产权人或未发现有关知识产权的登记,如有知识产权人并不愿意我们使用,如有侵权请立即联系:2622162128@qq.com ,我们立即下架或删除。

    Copyright© 2022-2024 www.wodocx.com ,All Rights Reserved |陕ICP备19002583号-1

    陕公网安备 61072602000132号     违法和不良信息举报:0916-4228922