论文标题

在受信任的执行环境中(缺乏)代码机密性

On (the Lack of) Code Confidentiality in Trusted Execution Environments

论文作者

Puddu, Ivan, Schneider, Moritz, Lain, Daniele, Boschetto, Stefano, Čapkun, Srdjan

论文摘要

已提出了可信赖的执行环境(TEE)作为保护代码机密性的解决方案,这些方案将计算外包给不受信任的操作员。我们研究了在两个常见的情况下对侧通道攻击的这种解决方案的弹性:当机密代码是一种本机二进制,在T恤中运输和执行时,当机密代码是在TEE内运行时执行的中间表示(IR)时。我们表明,在T恤中执行的运行时执行IR代码(例如WASM字节码)以高精度泄漏了大多数IR指令,因此揭示了机密代码。与IR执行相反,本机执行不易泄漏,甚至在很大程度上抵抗了最强大的侧向通道攻击。我们评估了Intel SGX和AMD SEV中的本机执行泄漏,并在实验上证明了Intel SGX上的端到端指令提取,WASM字节码为WAMR中执行的IR,这是IR,这是IRBRID,这是INTEL在Intel开发的JIT编译器与解释器之间的混合。我们的实验表明,此类系统中的IR代码泄漏是实用的,因此质疑依赖Tees+WASM的几种商业解决方案的安全要求。

Trusted Execution Environments (TEEs) have been proposed as a solution to protect code confidentiality in scenarios where computation is outsourced to an untrusted operator. We study the resilience of such solutions to side-channel attacks in two commonly deployed scenarios: when a confidential code is a native binary that is shipped and executed within a TEE and when the confidential code is an intermediate representation (IR) executed on top of a runtime within a TEE. We show that executing IR code such as WASM bytecode on a runtime executing in a TEE leaks most IR instructions with high accuracy and therefore reveals the confidential code. Contrary to IR execution, native execution is much less susceptible to leakage and largely resists even the most powerful side-channel attacks. We evaluate native execution leakage in Intel SGX and AMD SEV and experimentally demonstrate end-to-end instruction extraction on Intel SGX, with WASM bytecode as IR executed within WAMR, a hybrid between a JIT compiler and interpreter developed by Intel. Our experiments show that IR code leakage from such systems is practical and therefore question the security claims of several commercial solutions which rely on TEEs+WASM for code confidentiality.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源