CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves
Meni Orenbach (Technion), Yan Michalevsky (Anjuna), Christof Fetzer (TU Dresden, Scone), Mark Silberstein (Technion)
Published in USENIX ATC’19
CoSMIX: A Compiler-based System for Secure Memory Instrumentation - - PowerPoint PPT Presentation
CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves Meni Orenbach (Technion), Yan Michalevsky (Anjuna), Christof Fetzer (TU Dresden, Scone), Mark Silberstein (Technion) Published in USENIX ATC19
Meni Orenbach (Technion), Yan Michalevsky (Anjuna), Christof Fetzer (TU Dresden, Scone), Mark Silberstein (Technion)
Published in USENIX ATC’19
cryptography)
and more
Library OS and unikernel- based approaches enable execution of entire applications
Enclave OS
Motivation: missing OS abstractions, performance and side-channel protection
[Orenbach et al. ’17 (Eleos)]
against controlled side-channel attacks
6x the latency of signal handling without SGX
applications
languages
page-fault handling
memory access behavior
top of a backing store
mStore address Backing-store address
demand paging
as the EPC
execution in SGX
Controlled side-channel attacks can recover quite a bit of information by examining memory access patterns
[Xu et al. 2015]
Annotate memory allocations with memory stores to use
Annotate memory allocations with memory stores to use Proper memory access instrumentation is inferred based on allocation annotations
ORAM SUVM SUVM ORAM
Fetching a 4 KB page Workloads
600 MB dataset Random access to 1KB objects. 90% get / 10% set
600 MB dataset Random access to 1KB objects. 90% get / 10% set
SW page-fault handling
22
www.anjuna.io yan@anjuna.io