论文标题
Hector-V:用于安全RISC-V执行环境的异构CPU体系结构
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment
论文作者
论文摘要
为了确保应用程序的安全和值得信赖的执行,供应商经常将受信任的执行环境嵌入其系统中。在这里,应用程序免受对手的保护,包括恶意操作系统。 TEE通常是通过将保护机制直接集成到处理器或使用专用外部安全元素来构建的。但是,这两种方法仅涵盖狭窄的威胁模型,从而获得有限的安全保证。应用程序处理器中的飞地通常会在安全和非安全域之间提供弱隔离,尤其是在考虑侧通道攻击时。尽管安全元素确实提供了强烈的隔离,但施加处理器的慢速通信接口暴露于对手并限制用例。 T恤通常与使用的实施方法无关,通常缺乏与外围外围设备建立安全沟通的可能性,并且在TEE内部执行的大多数操作系统都没有提供最新的防御策略,从而使它们容易受到各种攻击的影响。我们认为在主应用程序处理器上实施的TEE是不安全的,尤其是在考虑侧通道攻击时。我们演示了如何利用异质体系结构来实现安全的T恤设计。我们将处理器直接嵌入我们的体系结构中,以在安全和非安全域之间提供强烈的隔离。 TEE和REE的紧密耦合使Hector-V能够提供建立安全沟通渠道的机制。我们进一步介绍了RISC-V Secure协作处理器,这是一个针对T恤量身定制的安全性的处理器。为了保护TEE内执行的应用程序,RVSCP提供了控制流的完整性,严格限制了I/O访问某些执行状态,并直接在硬件中提供操作系统服务。
To ensure secure and trustworthy execution of applications, vendors frequently embed trusted execution environments into their systems. Here, applications are protected from adversaries, including a malicious operating system. TEEs are usually built by integrating protection mechanisms directly into the processor or by using dedicated external secure elements. However, both of these approaches only cover a narrow threat model resulting in limited security guarantees. Enclaves in the application processor typically provide weak isolation between the secure and non-secure domain, especially when considering side-channel attacks. Although secure elements do provide strong isolation, the slow communication interface to the application processor is exposed to adversaries and restricts the use cases. Independently of the used implementation approach, TEEs often lack the possibility to establish secure communication to external peripherals, and most operating systems executed inside TEEs do not provide state-of-the-art defense strategies, making them vulnerable against various attacks. We argue that TEEs implemented on the main application processor are insecure, especially when considering side-channel attacks. We demonstrate how a heterogeneous architecture can be utilized to realize a secure TEE design. We directly embed a processor into our architecture to provide strong isolation between the secure and non-secure domain. The tight coupling of TEE and REE enables HECTOR-V to provide mechanisms for establishing secure communication channels. We further introduce RISC-V Secure Co-Processor, a security-hardened processor tailored for TEEs. To secure applications executed inside the TEE, RVSCP provides control-flow integrity, rigorously restricts I/O accesses to certain execution states, and provides operating system services directly in hardware.