Recent years have witnessed a trend of secure processor design in both academia and industry. Secure processors with hardware-enforced isolation can be a solid foundation of cloud computation in the future. However, due to recent side-channel attacks, the commercial secure processors failed to deliver the promises of a secure isolated execution environment. Sensitive information inside the secure execution environment always gets leaked via side channels. This work considers the most powerful software-based side-channel attackers, i.e., an All Digital State Observing (ADSO) adversary who can observe all digital states, including all digital states in secure enclaves. Traditional signature schemes are not secure in ADSO adversarial model. We introduce a new cryptographic primitive called One-Time Signature with Secret Key Exposure (OTS-SKE), which ensures no one can forge a valid signature of a new message or nonce even if all secret session keys are leaked. OTS-SKE enables us to sign attestation reports securely under the ADSO adversary. We also minimize the trusted computing base by introducing a secure co-processor into the system, and the interaction between the secure co-processor and the attestation processor is unidirectional. That is, the co-processor takes no inputs from the processor and only generates secret keys for the processor to fetch. Our experimental results show that the signing of OTS-SKE is faster than that of Elliptic Curve Digital Signature Algorithm (ECDSA) used in Intel SGX.
翻译:近些年来,学术界和工业界都出现了安全处理器设计趋势。 使用硬件强制隔离的安全处理器可以成为未来云计算的一个坚实基础。 但是,由于最近的侧道袭击,商业安全处理器未能兑现安全孤立执行环境的承诺。 安全执行环境中的敏感信息总是通过侧道泄露。 这项工作考虑到最强大的软件辅助通道袭击者, 即所有数字国家观测(ADSO)对手能够观察所有数字国家, 包括安全飞地的所有数字国家。 传统签名计划在ADSO对抗模式中并不安全。 我们引入了一个新的加密原始签名, 名为“ 一次性签名”, 带有绝密密键环境( OTS- SKE ), 这确保即使所有秘密会议密钥被泄漏, 安全执行环境中的敏感信息也不会被泄露。 OTS-SKE 允许我们在ADSO的顶顶部下安全地签署证明报告。 我们还通过在系统中引入一个安全的共处理器, 传统签名程序之间的互动, 而用于我们秘密的CRO- KA 的复制程序, 也是我们快速的磁盘的磁盘的复制程序。