Affiliation:
1. Computer Systems Laboratory, Stanford University, Stanford, CA and Compaq Systems Research
2. Computer Systems Laboratory, Stanford University, Stanford, CA
Abstract
Although there have been attempts to develop code transformations that yield tamper-resistant software, no reliable software-only methods are know. This paper studies the hardware implementation of a form of execute-only memory (XOM) that allows instructions stored in memory to be executed but not otherwise manipulated. To support XOM code we use a machine that supports internal compartments---a process in one compartment cannot read data from another compartment. All data that leaves the machine is encrypted, since we assume external memory is not secure. The design of this machine poses some interesting trade-offs between security, efficiency, and flexibility. We explore some of the potential security issues as one pushes the machine to become more efficient and flexible. Although security carries a performance penalty, our analysis indicates that it is possible to create a normal multi-tasking machine where nearly all applications can be run in XOM mode. While a virtual XOM machine is possible, the underlying hardware needs to support a unique private key, private memory, and traps on cache misses. For efficient operation, hardware assist to provide fast symmetric ciphers is also required.
Publisher
Association for Computing Machinery (ACM)
Reference25 articles.
1. Business Software Alliance 2000. http://www bsa. org.]] Business Software Alliance 2000. http://www bsa. org.]]
2. The Trusted Computing Platform Allicance 2000. http://www. trustedpc com.]] The Trusted Computing Platform Allicance 2000. http://www. trustedpc com.]]
3. Architectural support for fast symmetric-key cryptography
Cited by
179 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Survey of research on confidential computing;IET Communications;2024-04-23
2. Compiler-Based Memory Encryption for Machine Learning on Commodity Low-Power Devices;Proceedings of the 33rd ACM SIGPLAN International Conference on Compiler Construction;2024-02-17
3. Accelerating Extra Dimensional Page Walks for Confidential Computing;56th Annual IEEE/ACM International Symposium on Microarchitecture;2023-10-28
4. TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments;Proceedings of the 50th Annual International Symposium on Computer Architecture;2023-06-17
5. SecPB: Architectures for Secure Non-Volatile Memory with Battery-Backed Persist Buffers;2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA);2023-02