In 2020, Amazon introduced Nitro enclaves -- cloud-based secure enclaves that do not share hardware with untrustworthy code, therefore promising resistance against side channel attacks, which have plagued Intel's SGX for years. While their security properties are attractive, Nitro enclaves are difficult to write code for and are not meant to be used as a networked service, which greatly limits their potential. In this paper, we built a framework that allows for convenient and flexible use of Nitro enclaves by abstracting away complex aspects like remote attestation and end-to-end encryption between an enclave and a remote client. We demonstrate the practicality of our framework by designing and implementing two production-grade systems that solve real-world problems: remotely verifiable IP address pseudonymization and private telemetry. Our practical experience suggests that our framework enables quick prototyping, is flexible enough to accommodate different use cases, and inherits strong security and performance properties from the underlying Nitro enclaves.
翻译:2020年,亚马逊引入了硝化石飞地 -- -- 云基安全飞地,这些飞地不与不可信的代码共享硬件,因此对多年来困扰英特尔SGX的侧渠道袭击有希望的抵抗力。虽然它们的安保特性具有吸引力,但硝化物飞地很难并不打算被用作网络服务,这大大限制了它们的潜力。在本文中,我们建立了一个框架,通过抽取远程证明和飞地与边远客户之间的端到端加密等复杂方面,方便和灵活地使用硝化物飞地。我们通过设计和实施两个能解决现实世界问题的生产级系统,展示了我们的框架的实用性:可远程核查的IP地址化化和私人远程测量。我们的实际经验表明,我们的框架能够快速进行原型设计,足够灵活地适应不同的使用案例,并继承了内在硝化飞地的强大安全和性能特性。