middlebox technologies with intel sgx
play

Middlebox Technologies with Intel SGX A Literature Survey Shiv - PowerPoint PPT Presentation

Middlebox Technologies with Intel SGX A Literature Survey Shiv Kushwah & Sumukh Shivakumar 1 Whats all the fuss with middleboxes? 2 Background 3 What are middleboxes? 4 Middleboxes in the Cloud Cloud APLOMB gateway Enterprise


  1. Middlebox Technologies with Intel SGX A Literature Survey Shiv Kushwah & Sumukh Shivakumar 1

  2. What’s all the fuss with middleboxes? 2

  3. Background 3

  4. What are middleboxes? 4

  5. Middleboxes in the Cloud Cloud APLOMB gateway Enterprise APLOMB: Making Middleboxes Someone Else’s Problem - Network Processing as a Cloud 5 Service

  6. Problems with current Middlebox approaches 6

  7. Alternatives “Break and Inspect” 7

  8. Alternatives Homomorphic-Based 8

  9. What are Enclaves? Issues Untrusted App Code ● Memory Constrained Intel SGX Enclave No Network Calls ● Trusted App Code OCALL Syscalls, ● No Trusted Clock Network Calls ECALL Untrusted OS

  10. What are Enclaves? Host Expected Enclave Int x = 7; … Quoting Enclave Remote Attestation

  11. What are Enclaves? Host Expected Enclave Int x = 8; … Quoting Enclave Remote Attestation

  12. How can SGX help Middleboxes? ● SGX provides confidentiality and integrity ● Remotely attest SGX-enabled middleboxes ○ Enforce correct and secure program behavior ○ Bootstrap secure channel of communication 12

  13. SGX Solutions for Middleboxes Decrypting and Inspecting packets safely ● Processing and Saving information safely ● Resource efficiency ● 13

  14. Evaluation Metrics 14

  15. Metrics/Comparison Points Security Features Usability ● Network data protection ● Read encrypted packets? ● Implementation? ● Performance ● Processing inside ● Network function enclave? chaining ? ● Expressivity? ● Programmability? ● Network metadata ● Stateful processing? protection? ● Protects NF Vendor code? 15

  16. Metrics/Comparison Points Security Features Usability ● Network data protection ● Read encrypted packets? ● Implementation? ● Performance ● Processing inside ● Network function enclave? chaining ? ● Expressivity? ● Programmability? ● Network metadata ● Stateful processing? protection? ● Protects NF Vendor code? 16

  17. Metrics/Comparison Points Security Features Usability ● Network data protection ● Read encrypted packets? ● Implementation? ● Performance ● Processing inside ● Network function enclave? chaining ? ● Expressivity? ● Programmability? ● Network metadata ● Stateful processing? protection? ● Protects NF Vendor code? 17

  18. Metrics/Comparison Points Security Features Usability ● Network data protection ● Read encrypted packets? ● Implementation? ● Performance ● Processing inside ● Network function enclave? chaining ? ● Expressivity? ● Programmability? ● Network metadata ● Stateful processing? protection? ● Protects NF Vendor code? 18

  19. Overview of Space Resource Decrypt and Inspect Secure Processing in Third Parties Efficiencies PRI Snort w/ SGX S-NFV SGX-Box Safebricks LightBox EndBox mbTLS ShieldBox Trusted Click 19

  20. Lineage Diagram 2016 PRI [May 2016] S-NFV [Nov 2016] 2017 Attestation for Snort key sharing based Trusted Click [March 2017] SGX-Box [Aug 2017] Attestation for Packet Click key sharing decryption Based ShieldBox [Sept 2017] mbTLS Click 2018 [Dec 2017] Based Snort w/ SGX EndBox [Feb 2018] [June 2018] Stateful Framework Safebricks [April 2018] 2019 LightBox [Nov 2019] 20

  21. Category 1: Decrypt and Inspect 21

  22. Decrypt and Inspect 2016 PRI [May 2016] S-NFV [Nov 2016] 2017 Attestation for Snort key sharing based Trusted Click [March 2017] SGX-Box [Aug 2017] Attestation for Packet Click key sharing decryption Based ShieldBox [Sept 2017] mbTLS Click 2018 [Dec 2017] Based Snort w/ SGX EndBox [Feb 2018] [June 2018] Stateful Framework Safebricks [April 2018] 2019 LightBox [Nov 2019] 22

  23. Decrypt and Inspect Remote Attestation Middlebox Enclave Network I/O Untrusted App SGX-BOX: Enabling PRI: Privacy Preserving Visibility on Encrypted Inspection Inspection of Traffic using a Secure Encrypted Network Middlebox Module Traffic 23

  24. Multiple Middleboxes mbTLS : And Then There Were More - Secure Communication for More Than Two Parties 24

  25. Category 2: Secure Processing in the Cloud 25

  26. Lineage Diagram 2016 PRI [May 2016] S-NFV [Nov 2016] 2017 Attestation for Snort key sharing based Trusted Click [March 2017] SGX-Box [Aug 2017] Attestation for Packet Click key sharing decryption Based ShieldBox [Sept 2017] mbTLS Click 2018 [Dec 2017] Based Snort w/ SGX EndBox [Feb 2018] [June 2018] Stateful Framework Safebricks [April 2018] 2019 LightBox [Nov 2019] 26

  27. Main Ideas ● Approaches are concerned with problems of running NFs on cloud Need to protect confidentiality of traffic ○ ○ Securely and efficiently read packets ○ Securely enable NF chaining ○ Protect NF vendor code ● Build on existing NF technologies ○ Click ○ Snort NF-enclave specific approaches ○ 27

  28. Middleboxes in the Cloud Cloud APLOMB Enterprise 28

  29. What is Click? ● Software framework for packet processing ● Elements implement router functions ● Click configurations are modular and easy to extend 29

  30. Click Based Approaches Middlebox Enclave Network I/O Enclave Untrusted Enclave 30 Trusted Click: Overcoming Security issues of NFV in the Cloud

  31. What is Snort? ● Signature-based Intrusion Detection/Prevention system ● Real time traffic analysis and packet logging ● Stateful (based on flows) 31

  32. Snort Based Approaches Middlebox Enclave NIC Untrusted Snort Graphene-SGX Snort IDS with Intel Software Guard Extensions 32

  33. Recent Approaches Middlebox Enclave etap Network etap client I/O Stateful Processing Gateway State management 33 LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed

  34. Category 3: Resource Efficiency 34

  35. Resource Efficiency Run SGX middleboxes on client machines ● ○ Connections go through client SGX middleboxes because of VPN keys Connections sent directly are refused ■ ○ After, necessary processing, SGX middlebox forwards traffic accordingly https://www.ibr.cs.tu-bs.de/users/goltz sch/slides/endbox-dsn18.pdf EndBox : Scalable Middlebox Functions Using Client-Side Trusted Execution 35

  36. Future Work 36

  37. Future Directions ● Decentralized Approach ○ Stateful processing ○ Least Privilege to keep NFs “honest” ● Side Channels ○ Existing work focuses on metadata protection, not on timing related or other side channels 37

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend