Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX
January 21, 2020 Β· Declared Dead Β· π International Conference on Architectural Support for Programming Languages and Operating Systems
"No code URL or promise found in abstract"
Evidence collected by the PWNC Scanner
Authors
Youren Shen, Hongliang Tian, Yu Chen, Kang Chen, Runji Wang, Yi Xu, Yubin Xia
arXiv ID
2001.07450
Category
cs.OS: Operating Systems
Cross-listed
cs.AR,
cs.CR
Citations
183
Venue
International Conference on Architectural Support for Programming Languages and Operating Systems
Last Checked
1 month ago
Abstract
Intel Software Guard Extensions (SGX) enables user-level code to create private memory regions called enclaves, whose code and data are protected by the CPU from software and hardware attacks outside the enclaves. Recent work introduces library operating systems (LibOSes) to SGX so that legacy applications can run inside enclaves with few or even no modifications. As virtually any non-trivial application demands multiple processes, it is essential for LibOSes to support multitasking. However, none of the existing SGX LibOSes support multitasking both securely and efficiently. This paper presents Occlum, a system that enables secure and efficient multitasking on SGX. We implement the LibOS processes as SFI-Isolated Processes (SIPs). SFI is a software instrumentation technique for sandboxing untrusted modules (called domains). We design a novel SFI scheme named MPX-based, Multi-Domain SFI (MMDSFI) and leverage MMDSFI to enforce the isolation of SIPs. We also design an independent verifier to ensure the security guarantees of MMDSFI. With SIPs safely sharing the single address space of an enclave, the LibOS can implement multitasking efficiently. The Occlum LibOS outperforms the state-of-the-art SGX LibOS on multitasking-heavy workloads by up to 6,600X on micro-benchmarks and up to 500X on application benchmarks.
Community Contributions
Found the code? Know the venue? Think something is wrong? Let us know!
π Similar Papers
In the same crypt β Operating Systems
R.I.P.
π»
Ghosted
R.I.P.
π»
Ghosted
LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels
R.I.P.
π»
Ghosted
SGX-LKL: Securing the Host OS Interface for Trusted Execution
R.I.P.
π»
Ghosted
Optimal Virtual Cluster-based Multiprocessor Scheduling
R.I.P.
π»
Ghosted
Ecovisor: A Virtual Energy System for Carbon-Efficient Applications
R.I.P.
π»
Ghosted
FreeGuard: A Faster Secure Heap Allocator
Died the same way β π» Ghosted
R.I.P.
π»
Ghosted
Language Models are Few-Shot Learners
R.I.P.
π»
Ghosted
PyTorch: An Imperative Style, High-Performance Deep Learning Library
R.I.P.
π»
Ghosted
XGBoost: A Scalable Tree Boosting System
R.I.P.
π»
Ghosted