Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing

Dayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gadamaduggu, Anjo Vahldiek-Oberwagner, Mona Vij, Dawn Song, Sanjit A. Seshia, and Krste Asanovic. Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022.

Download

[pdf] 

Abstract

Hardware enclaves rely on a disjoint memory model, which maps each physical address to an enclave to achieve strong memory isolation. However, this severely limits the performance and programmability of enclave programs. While some prior work proposes enclave memory sharing, it does not provide a formal model or verification of their designs. This paper presents Cerberus, a formal approach to secure and efficient enclave memory sharing. To reduce the burden of formal verification, we compare different sharing models and choose a simple yet powerful sharing model. Based on the sharing model, Cerberus extends an enclave platform such that enclave memory can be made immutable and shareable across multiple enclaves via additional operations. We use incremental verification starting with an existing formal model called the Trusted Abstract Platform (TAP). Using our extended TAP model, we formally verify that Cerberus does not break or weaken the security guarantees of the enclaves despite allowing memory sharing. More specifically, we prove the Secure Remote Execution (SRE) property on our formal model. Finally, the paper shows the feasibility of Cerberus by implementing it in an existing enclave platform, RISC-V Keystone.

BibTeX

@inproceedings{leecheang-ccs22,
  author    = {Dayeol Lee and Kevin Cheang and Alexander Thomas and Catherine Lu and Pranav Gadamaduggu and Anjo Vahldiek-Oberwagner and Mona Vij and Dawn Song and Sanjit A. Seshia and Krste Asanovic},
  title     = {Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing},
  booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
               Communications Security (CCS)},
  OPTpages     = {1--16},
  year      = {2022},
  abstract  = {Hardware enclaves rely on a disjoint memory model, which maps each physical address to an enclave to achieve strong memory isolation.  However, this severely limits the performance and programmability of enclave programs.  While some prior work proposes enclave memory sharing, it does not provide a formal model or verification of their designs.  This paper presents Cerberus, a formal approach to secure and efficient enclave memory sharing.  To reduce the burden of formal verification, we compare different sharing models and choose a simple yet powerful sharing model.  Based on the sharing model, Cerberus extends an enclave platform such that enclave memory can be made immutable and shareable across multiple enclaves via additional operations.  We use incremental verification starting with an existing formal model called the Trusted Abstract Platform (TAP).  Using our extended TAP model, we formally verify that Cerberus does not break or weaken the security guarantees of the enclaves despite allowing memory sharing. More specifically, we prove the Secure Remote Execution (SRE) property on our formal model.  Finally, the paper shows the feasibility of Cerberus by implementing it in an existing enclave platform, RISC-V Keystone.},
}

Generated by bib2html.pl (written by Patrick Riley ) on Sun Oct 09, 2022 12:16:25