论文标题

通过专门使用的物理性硬件最大程度地减少信任

Minimizing Trust with Exclusively-Used Physically-Isolated Hardware

论文作者

Yao, Zhihao, Talebi, Seyed Mohammadjavad Seyed, Chen, Mingyi, Sani, Ardalan Amiri, Anderson, Thomas

论文摘要

智能手机所有者通常需要与其他不受信任和潜在恶意程序同一设备上运行关键安全程序。这要求用户信任硬件和系统软件,以正确地使用沙盒恶意程序,这通常放错了位置。 我们的目标是最大程度地减少智能手机所有者需要信任以承受对抗性输入的硬件和软件组件的数量和复杂性。我们提出了由静态分配,物理分离的信任域组成的多域硬件设计。我们介绍了一些简单的,正式验证的硬件组件,以使程序能够临时获得可证明的独家且同时访问计算和I/O。为了管理这个硬件,我们提出了章鱼,该操作系统由相互不信任的子系统组成。 我们在CPU-FPGA板上介绍了该机器(硬件和操作系统)的原型,并表明与现代SOC相比,它会产生小的硬件成本。对于关键安全计划,我们表明,与主流T恤相比,这台机器在达到不错的性能的同时大大降低了所需的信任。对于普通程序,性能类似于传统机器。

Smartphone owners often need to run security-critical programs on the same device as other untrusted and potentially malicious programs. This requires users to trust hardware and system software to correctly sandbox malicious programs, trust that is often misplaced. Our goal is to minimize the number and complexity of hardware and software components that a smartphone owner needs to trust to withstand adversarial inputs. We present a multi-domain hardware design composed of statically-partitioned, physically-isolated trust domains. We introduce a few simple, formally-verified hardware components to enable a program to gain provably exclusive and simultaneous access to both computation and I/O on a temporary basis. To manage this hardware, we present OctopOS, an OS composed of mutually distrustful subsystems. We present a prototype of this machine (hardware and OS) on a CPU-FPGA board and show that it incurs a small hardware cost compared to modern SoCs. For security-critical programs, we show that this machine significantly reduces the required trust compared to mainstream TEEs while achieving decent performance. For normal programs, performance is similar to a legacy machine.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源