Projekte pro Jahr
Abstract
Efficient and secure in-process isolation is in great demand, as evidenced in the shift towards JavaScript and the recent revival of memory protection keys. Yet, state-of-the-art systems do not offer strong security or struggle with frequent domain crossings and oftentimes intrusive kernel modifications. We propose Donky, an efficient hardware-software co-design for strong in-process isolation based on dynamic memory protection domains. The two components of our design are a secure software framework and a non-intrusive hardware extension. We facilitate domain switches entirely in userspace, thus minimizing switching overhead as well as kernel complexity. We show the versatility of Donky in three realistic use cases, secure V8 sandboxing, software vaults, and untrusted third-party libraries. We provide an open-source implementation on a RISC-V Ariane CPU and an Intel-MPK-based emulation mode for x86. We evaluate the security and performance of our implementation for RISC-V synthesized on an FPGA. We also evaluate the performance on x86 and show why our new design is more secure than Intel MPK. Donky does not impede the runtime of in-domain computation. Cross-domain switches are 16–116x faster than regular process context switches. Fully protecting the mbedTLS cryptographic operations has a 4 % overhead.
Originalsprache | englisch |
---|---|
Titel | Proceedings of the 29th USENIX Security Symposium |
Herausgeber (Verlag) | USENIX Association |
Seiten | 1677-1694 |
Seitenumfang | 18 |
ISBN (elektronisch) | 9781939133175 |
Publikationsstatus | Veröffentlicht - Aug. 2020 |
Veranstaltung | 29th USENIX Security Symposium: USENIX Security 2020 - Virtuell, USA / Vereinigte Staaten Dauer: 12 Aug. 2020 → 14 Aug. 2020 https://www.usenix.org/conference/usenixsecurity20/ |
Publikationsreihe
Name | Proceedings of the 29th USENIX Security Symposium |
---|
Konferenz
Konferenz | 29th USENIX Security Symposium |
---|---|
Land/Gebiet | USA / Vereinigte Staaten |
Ort | Virtuell |
Zeitraum | 12/08/20 → 14/08/20 |
Internetadresse |
ASJC Scopus subject areas
- Information systems
- Sicherheit, Risiko, Zuverlässigkeit und Qualität
- Computernetzwerke und -kommunikation
-
Data Security - KC - KD-07 Skalierbare Knowledge-Discovery-Komponenten
Mangard, S. (Teilnehmer (Co-Investigator))
1/07/17 → 31/12/26
Projekt: Forschungsprojekt
-
Espresso - Skalierbare hardware-gesicherte authentifizierung und Personalisierung intelligenter Sensorknoten
Mangard, S. (Teilnehmer (Co-Investigator))
1/05/18 → 31/10/20
Projekt: Forschungsprojekt
-
EU - SOPHIA - Absicherung von Software gegen Physische Angriffe
Mangard, S. (Teilnehmer (Co-Investigator))
1/09/16 → 31/12/21
Projekt: Forschungsprojekt