Secure Enclave For MCUs

简介: A new secure enclave implementation in RISC-V Trusted Exectuion Environment

Effectively Manipulation In Enclave Execution For MCU Class

T-HEAD Alibaba Group Vincent Cui cxx194832@alibaba-inc.com

Outline

To guarantee all enclaves execute in authentic and trustworthy platform separately, we shall assure the attestation chain of trust is provable security from power on to system running even there exists with vulnerability inside in constrained resource chip. Beside from those known issue, there is still not a better scheme to manipulate device arbitrarily in enclave, it might result in user sensitive and privacy data generated from the device leakage when the device is also shared to other enclave. RISC-V offers a classical U/M secure program mode for embedded device. Obviously, the ZSBL (Zero Stage Boot Loader) and privilege code running in machine mode are our TCB (Trusted Computing Base), the other parts belongs to user mode scope. In addition to RISC-V inherence security, we are desired to support secure boot、secure enclave execution and secure device manipulation in enclave. We specially introduce a proposal which allows one enclave could own and operate specific-peripheral arbitrarily. It is very practical functionality in IoT product because amount of data generated by specific device in product is too valuable and private for user to be revealed by itself share to other application.

Secure Boot

The ZSBL is responsible for generating a couple of key and certification will be used In sequence operation. It mainly includes RISC-V core attestation key and certification aside from a storage symmetric key. The symmetric key is derived from a temper-resistant device secret in hardware. Some attestation key and certification are derived from processor attestation key and certification.

Secure Enclave Execution

Enclaves usually run on SEP (Secure Enclave Platform) which must be provable authenticity. Its properties could be decomposed into Execution Integrity, I/O Data Confidentiality and Program Measurement. With that alone, SEP provides a small set of primitives for enclave, all outside software could only interact with enclave via those primitives without any information leakage. To enable efficient I/O interaction with host program, SEP allows enclave to access the entire address space of host program. Once SEP verifies the desired enclave measurement correctly, host program can only transfer its control to the enclave at statically-define location named “entrypoint”. Due to constraint resource, all enclave should be linked with system program statically. Beyond enabling isolated execution, SEP implements primitive to provide attestation information for enclave in need.

Secure Device Manipulation with DEVPMP In Enclave

One enclave could manipulate a specific-device arbitrarily by setting the device register address space into DEVPMP register in privilege software in RISC-V core. But privilege software attacker can allocate same resource for other enclave. To address the need, we require extent a bit of DEVPMP register and PMP checker policy to protect it against access by other enclaves. The configuration of DEVPMP register like this will remain effective until next reboot. Consequently, the device interrupt is handled in the enclave else.

Above three aspect of enclave implementation could make sure enclave runs at secure platform and execution without sensitive information disclosure.

原文作者:cui_632
点击查看原文

相关文章
|
3月前
|
监控 安全 Linux
在Linux中,如何管理SSL/TLS证书?
在Linux中,如何管理SSL/TLS证书?
|
6月前
|
网络协议 安全
Mutual TLS (mTLS) Authentication
Mutual TLS (mTLS) Authentication
79 1
|
6月前
|
安全 Linux API
Keystore、Key attestation
Keystore、Key attestation
198 0
Keystore、Key attestation
|
安全 Unix Linux
探索安全高效的文件传输:Linux Secure Copy Protocol (SCP)
Linux系统中的scp(secure copy)命令用于以安全方式在服务器之间复制文件。通过使用SCP命令或安全副本,可以在本地主机和远程主机之间或两个远程主机之间安全地传输文件。它使用与安全外壳(SSH)协议中相同的身份验证和安全性。SCP以其简单性,安全性和预安装的可用性而闻名。在当今数字化的时代,安全高效的文件传输对于个人和企业来说都至关重要。Linux Secure Copy Protocol (SCP) 作为一种基于SSH的文件传输工具,以其安全性、简单性和跨平台性而受到广泛欢迎。
259 0
|
安全 网络安全 数据安全/隐私保护
1.3 Metasploit 生成SSL加密载荷
在本节中,我们将介绍如何通过使用`Metasploit`生成加密载荷,以隐藏网络特征。前一章节我们已经通过`Metasploit`生成了一段明文的ShellCode,但明文的网络传输存在安全隐患,因此本节将介绍如何通过生成SSL证书来加密ShellCode,使得网络特征得到隐藏,从而提高后门的生存能力和抵抗网络特征分析的能力。
114 0
|
应用服务中间件 Linux Shell
使用Docker编译OpenResty支持国密ssl加密
OpenResty自身支持标准SSL协议,但不支持国密SSL协议;本文主要概述如何在docker环境下编译OpenResty镜像支持国密SSL加密。
1027 0
|
存储 监控 安全
【数据安全】什么是安全飞地(Secure Enclave)?
企业IT的一个主要威胁已经存在于组织内部:内部人员。虽然大多数企业已经采取措施保护系统不受最终用户的影响,但有资格的内部人员可以不受限制地访问更为危险,这不仅限于员工。第三方,包括云提供商的员工,往往是内部违规的罪魁祸首。
|
算法 网络协议 安全
用OpenSSL编写SSL,TLS程序
用OpenSSL编写SSL,TLS程序(1) 作者:tamsyn  来源:www.
1441 0
|
Kubernetes 监控 安全
Sysdig Secure使用体验
Sysdig创立于2013年,总部位于美国旧金山。是一家云原生的可见性和安全性公司,为企业及其DevOps团队提供云和容器安全性。它推动了安全的DevOps运动,帮助组织放心地保护容器,Kubernetes和云服务。借助Sysdig Secure DevOps平台,云团队可以连续不断地保护构建管道,检测和响应运行时威胁验证合规性,并对云基础架构和服务进行监视和故障排除。
1004 0
|
算法 Linux 数据安全/隐私保护
Linux 生成CRT、KEY、CSR证书
今天在配置kibana权限设置时,kibana要求使用https链接。 于是总结了一下linux下openssl生成 签名的步骤: x509证书一般会用到三类文,key,csr,crt。
4081 0