A TrustZone TEE often invokes an external filesystem. While filedata can be encrypted, the revealed file activities can leak secrets. To hide the file activities from the filesystem and its OS, we propose Enigma, a deception-based defense injecting sybil file activities as the cover of the actual file activities. Enigma contributes three new designs. (1) To make the deception credible, the TEE generates sybil calls by replaying file calls from the TEE code under protection. (2) To make sybil activities cheap, the TEE requests the OS to run K filesystem images simultaneously. Concealing the disk, the TEE backs only one image with the actual disk while backing other images by only storing their metadata. (3) To protect filesystem image identities, the TEE shuffles the images frequently, preventing the OS from observing any image for long. Enigma works with unmodified filesystems shipped withLinux. On a low-cost Arm SoC with EXT4 and F2FS, our system can concurrently run as many as 50 filesystem images with 1% of disk overhead per additional image. Compared to common obfuscation for hiding addresses in a flat space, Enigma hides file activities with richer semantics. Its cost is lower by one order of magnitude while achieving the same level of probabilistic security guarantees.
翻译:信任区 TEE 通常会引用外部文件系统 。 虽然可加密存档数据, 被披露的文件活动会泄露机密 。 为了隐藏文件活动, 隐藏文件系统及其操作系统, 我们提议 Engigma, 一种欺骗性防御注射系统, 将Sybil 文件活动作为实际文件活动的掩护 。 Engigma 提供三种新的设计 。 (1) 为了使欺骗可信, TEE 使用被保护的TEE 代码重播文件系统, 生成 Sybil 电话 。 (2) 为使 Sybil 活动便宜, TEE 请求OS 同步运行 K 文件系统图像 。 隐藏磁盘, TEE 仅用一个磁盘背着一个图像, 支持其他图像 。 (3) 保护文件系统图像身份, TEE 经常刷新图像, 防止OS 长期观察任何图像 。 使用与Linux 一同发送的未调整的文件系统进行 Eybild 工作 。 (2) 使用 EXT4 和 F2FS, 我们的系统可以同时运行50个文件系统图像, 和磁盘上磁盘头图像的1%, 背面图像的图像背背图,, 并隐藏一个更低级的磁级, 。 将隐藏一个磁级的磁级的磁级, 。