Show simple item record

dc.contributor.authorBourgeat, Thomas
dc.contributor.authorLebedev, Ilia A.
dc.contributor.authorWright, Andrew D.
dc.contributor.authorZhang, Sizhuo
dc.contributor.authorArvind
dc.contributor.authorDevadas, Srinivas
dc.date.accessioned2021-03-04T14:32:18Z
dc.date.available2021-03-04T14:32:18Z
dc.date.issued2019-10
dc.identifier.isbn9781450369381
dc.identifier.urihttps://hdl.handle.net/1721.1/130076
dc.description.abstractRecent attacks have broken process isolation by exploiting microarchitectural side channels that allow indirect access to shared microarchitectural state. Enclaves strengthen the process abstraction to restore isolation guarantees. We propose MI6, an aggressively speculative out-of-order processor capable of providing secure enclaves under a threat model that includes an untrusted OS and an attacker capable of mounting any software attack currently considered practical, including those utilizing control flow mis-speculation. MI6 is inspired by Sanctum [16] and extends its isolation guarantee to more realistic memory hierarchy. It also introduces a purge instruction, which is used only when a secure process is (de)scheduled, and implements it for a complex processor microarchitecture. We model the performance impact of enclaves in MI6 through FPGA emulation on AWS F1 FPGAs by running SPEC CINT2006 benchmarks as enclaves within an untrusted Linux OS. Security comes at the cost of approximately 16.4% average slowdown for protected programs.en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS-1413920)en_US
dc.description.sponsorshipUnited States. Space and Naval Warfare Systems Command (Contract N66001-15-C-4066)en_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency (Grant HR001118C0018)en_US
dc.language.isoen
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionof10.1145/3352460.3358310en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourcearXiven_US
dc.titleMI6: Secure Enclaves in a Speculative Out-of-Order Processoren_US
dc.typeArticleen_US
dc.identifier.citationBourgeat, Thomas et al. “MI6: Secure Enclaves in a Speculative Out-of-Order Processor.” Paper presented at the Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, Columbus OH, October 2019, Association for Computing Machinery: 42–56 © 2019 The Author(s)en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.relation.journalProceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitectureen_US
dc.eprint.versionOriginal manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2020-12-09T19:12:10Z
dspace.orderedauthorsBourgeat, T; Lebedev, I; Wright, A; Zhang, S; Arvind, ; Devadas, Sen_US
dspace.date.submission2020-12-09T19:12:14Z
mit.journal.volume2019en_US
mit.licenseOPEN_ACCESS_POLICY
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record