MATEE: Multimodal Attestation for Trusted Execution Environments

被引:1
|
作者
Galanou, Anna [1 ]
Gregor, Franz [1 ]
Kapitza, Ruediger [2 ]
Fetzer, Christof [1 ]
机构
[1] Tech Univ Dresden, Dresden, Germany
[2] Friedrich Alexander Univ Erlangen Nurnberg, Erlangen, Germany
关键词
Attestation; Side-channel attacks; TEEs; SGX; TPM;
D O I
10.1145/3528535.3565239
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Confidential computing services enable users to run their workloads in Trusted Execution Environments (TEEs) leveraging secure hardware like Intel SGX, and verify them by performing remote attestation. This process offers necessary proof for the integrity of users' software and the authenticity of the hardware, signed by a hardware-specific attestation key. Recent side-channel attacks have successfully retrieved such keys, enabling attackers to forge the attestation data and thereby undermining users' trust in their TEE. If the attestation proof is bound to a second hardware root of trust impervious to side-channel attacks, then the remote attestation process can maintain its security guarantees. In this paper, we introduce MATEE, a novel remote attestation mechanism for TEEs that creates a second chain of trust to a Trusted Platform Module (TPM), adding diverse redundancy into the existing attestation process. Targeting SGX enclaves for our prototype, as the most prominent TEE implementation to date, we describe how MATEE satisfies the necessary security requirements as well as present several scenarios that demonstrate its applicability and its benefits to the confidential computing landscape.
引用
收藏
页码:121 / 134
页数:14
相关论文
共 50 条
  • [31] BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
    Machiry, Aravind
    Gustafson, Eric
    Spensky, Chad
    Salls, Chris
    Stephens, Nick
    Wang, Ruoyu
    Bianchi, Antonio
    Choe, Yung Ryn
    Kruegel, Christopher
    Vigna, Giovanni
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [32] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [33] SafeKeeper: Protecting Web Passwords using Trusted Execution Environments
    Krawiecka, Klaudia
    Kurnikov, Arseny
    Paverd, Andrew
    Mannan, Mohammad
    Asokan, N.
    WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018), 2018, : 349 - 358
  • [34] SYSTEMATIZATION OF TRUSTED I/O SOLUTIONS FOR ISOLATED EXECUTION ENVIRONMENTS
    Stancu, Florin-Alexandru
    Mircea, Alexandru-Alin
    Rughiniș, Răzvan
    Chiroiu, Mihai
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2022, 84 (02): : 3 - 14
  • [35] How trusted execution environments fuel research on microarchitectural attacks
    Schwarz, Michael
    Gruss, Daniel
    IEEE Security and Privacy, 2020, 18 (05): : 18 - 27
  • [36] Profiling with trust: system monitoring from trusted execution environments
    Christian Eichler
    Jonas Röckl
    Benedikt Jung
    Ralph Schlenk
    Tilo Müller
    Timo Hönig
    Design Automation for Embedded Systems, 2024, 28 : 23 - 44
  • [37] Universal Trusted Execution Environments for Securing SDN/NFV Operations
    Lefebvre, Vincent
    Santinelli, Gianni
    Mueller, Tilo
    Goetzfried, Johannes
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [38] Profiling with trust: system monitoring from trusted execution environments
    Eichler, Christian
    Roeckl, Jonas
    Jung, Benedikt
    Schlenk, Ralph
    Mueller, Tilo
    Hoenig, Timo
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2024, 28 (01) : 23 - 44
  • [39] Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats
    Lacoste, Marc
    Lefebvre, Vincent
    IEEE SECURITY & PRIVACY, 2023, 21 (03) : 37 - 46
  • [40] A Secure IIoT Gateway Architecture based on Trusted Execution Environments
    Froehlich, Antonio Augusto
    Horstmann, Leonardo Passig
    Hoffmann, Jose Luis Conradi
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (02)