MATEE: Multimodal Attestation for Trusted Execution Environments

被引:1
|
作者
Galanou, Anna [1 ]
Gregor, Franz [1 ]
Kapitza, Ruediger [2 ]
Fetzer, Christof [1 ]
机构
[1] Tech Univ Dresden, Dresden, Germany
[2] Friedrich Alexander Univ Erlangen Nurnberg, Erlangen, Germany
关键词
Attestation; Side-channel attacks; TEEs; SGX; TPM;
D O I
10.1145/3528535.3565239
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Confidential computing services enable users to run their workloads in Trusted Execution Environments (TEEs) leveraging secure hardware like Intel SGX, and verify them by performing remote attestation. This process offers necessary proof for the integrity of users' software and the authenticity of the hardware, signed by a hardware-specific attestation key. Recent side-channel attacks have successfully retrieved such keys, enabling attackers to forge the attestation data and thereby undermining users' trust in their TEE. If the attestation proof is bound to a second hardware root of trust impervious to side-channel attacks, then the remote attestation process can maintain its security guarantees. In this paper, we introduce MATEE, a novel remote attestation mechanism for TEEs that creates a second chain of trust to a Trusted Platform Module (TPM), adding diverse redundancy into the existing attestation process. Targeting SGX enclaves for our prototype, as the most prominent TEE implementation to date, we describe how MATEE satisfies the necessary security requirements as well as present several scenarios that demonstrate its applicability and its benefits to the confidential computing landscape.
引用
收藏
页码:121 / 134
页数:14
相关论文
共 50 条
  • [1] Attestation Mechanisms for Trusted Execution Environments Demystified
    James, Menetrey
    Gottel, Christian
    Khurshid, Anum
    Pasin, Marcelo
    Felber, Pascal
    Schiavoni, Valerio
    Raza, Shahid
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS (DAIS 2022), 2022, 13272 : 95 - 113
  • [2] Key Attestation from Trusted Execution Environments
    Kostiainen, Kari
    Dmitrienko, Alexandra
    Ekberg, Jan-Erik
    Sadeghi, Ahmad-Reza
    Asokan, N.
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 30 - +
  • [3] Remote Attestation Assurance Arguments for Trusted Execution Environments
    Usman, Ahmad B.
    Cole, Nigel
    Asplund, Mikael
    Boeira, Felipe
    Vestlund, Christian
    PROCEEDINGS OF THE 2023 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, SAT-CPS 2023, 2023, : 33 - 42
  • [4] GuaranTEE: Introducing Control-Flow Attestation for Trusted Execution Environments
    Morbitzer, Mathias
    Kopf, Benedikt
    Zieris, Philipp
    2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD, 2023, : 547 - 553
  • [5] Graviton: Trusted Execution Environments on GPUs
    Volos, Stavros
    Vaswani, Kapil
    Bruno, Rodrigo
    PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2018, : 681 - 696
  • [6] Building Open Trusted Execution Environments
    Kohlbrenner, David
    Shinde, Shweta
    Lee, Dayeol
    Asanovic, Krste
    Song, Dawn
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 47 - 56
  • [7] MultiTEE: Distributing Trusted Execution Environments
    Ott, Simon
    Orthen, Benjamin
    Weidinger, Alexander
    Horsch, Julian
    Nayani, Vijayanand
    Ekberg, Jan-Erik
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1617 - 1629
  • [8] Fuzzing trusted execution environments with Rust
    Blinowski, Grzegorz
    Szaknis, Michal
    COMPUTERS & SECURITY, 2025, 150
  • [9] A survey on the (in)security of trusted execution environments
    Munoz, Antonio
    Rios, Ruben
    Roman, Rodrigo
    Lopez, Javier
    COMPUTERS & SECURITY, 2023, 129
  • [10] Towards Modular Trusted Execution Environments
    Weinhold, Carsten
    Asmussen, Nils
    Goehringer, Diana
    Roitzsch, Michael
    PROCEEDINGS OF THE 2023 6TH WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION, SYSTEX 2023, 2023, : 10 - 16