论文标题
CTR:检查点,传输和还原以确保安全飞地
CTR: Checkpoint, Transfer, and Restore for Secure Enclaves
论文作者
论文摘要
基于硬件的受信任的执行环境(TEE)在云计算中越来越普遍,为机密计算构成了基础。但是,TEE的安全目标有时会与现有的云功能(例如VM或过程迁移)冲突,因为Tee内存无法由平台上的管理程序,OS或其他软件读取。尽管一些新的TEE架构支持整个受保护的VM的迁移,但目前尚无实际解决方案来迁移包含进程内的TEE的单个过程。如果必须紧急重新启动主机平台,则无法迁移此类过程会导致运行效率低下甚至数据丢失。 我们提出了CTR,这是一种仅软件设计,可将迁移功能改造为现有的TEE架构,同时维护其预期的安全保证。我们的设计允许在执行中的任意点中断和迁移,从而保持与现有VM和过程迁移技术的兼容性。通过合作涉及TEE在迁移过程中,我们的设计还允许应用程序开发人员指定与状态迁移相关的政策,例如限制可能迁移特定TEE的次数。我们对英特尔SGX的原型实现表明,迁移潜伏期随TEE内存的大小线性增加,并由TEE系统操作主导。
Hardware-based Trusted Execution Environments (TEEs) are becoming increasingly prevalent in cloud computing, forming the basis for confidential computing. However, the security goals of TEEs sometimes conflict with existing cloud functionality, such as VM or process migration, because TEE memory cannot be read by the hypervisor, OS, or other software on the platform. Whilst some newer TEE architectures support migration of entire protected VMs, there is currently no practical solution for migrating individual processes containing in-process TEEs. The inability to migrate such processes leads to operational inefficiencies or even data loss if the host platform must be urgently restarted. We present CTR, a software-only design to retrofit migration functionality into existing TEE architectures, whilst maintaining their expected security guarantees. Our design allows TEEs to be interrupted and migrated at arbitrary points in their execution, thus maintaining compatibility with existing VM and process migration techniques. By cooperatively involving the TEE in the migration process, our design also allows application developers to specify stateful migration-related policies, such as limiting the number of times a particular TEE may be migrated. Our prototype implementation for Intel SGX demonstrates that migration latency increases linearly with the size of the TEE memory and is dominated by TEE system operations.