• No results found

The Reduced Address Space (RAS) for Application Memory Authentication

N/A
N/A
Protected

Academic year: 2021

Share "The Reduced Address Space (RAS) for Application Memory Authentication"

Copied!
24
0
0

Loading.... (view fulltext now)

Full text

(1)

The Reduced Address Space (RAS) for

Application Memory Authentication

David Champagne, Reouven Elbaz and Ruby B. Lee

(2)

Introduction

Objective

9 Provide application memory authentication: What the application reads from a memory location is what it last wrote there.

Security Model:

9 Threats:

• Physical attacks: Tampering with bus data or memory chip • Software (SW) Attacks: Compromised OS

9 Assumptions:

• Processor chip is the security perimeter

• Application to protect is correctly written (no SW vulnerabilities) • On-chip engine can authenticate initial state of application

Background

:

9 TPM, XOM, AEGIS, SP, SecureBlue want to provide trust in an

application’s computations and protect private information.

9 An adversary corrupting the memory space of an application can

(3)

Outline

Introduction to memory integrity trees

Past Work:

9 Building a tree over the physical address space (PAS Tree)

9Insecure: branch splicing attack

9 Building a tree over the virtual address space (VAS Tree)

9Impractical

Proposed Approach

9 A novel Reduced Address Space (RAS)

9 Building a tree over the RAS (RAS Tree)

9 Managing the RAS Tree with the Tree Management Unit (TMU)

9 Performance evaluation

(4)

P-1

P0 P1

P2 P3 P4 P5

P6 P7 P8 P9 P10 P11 P12 P13

Addressing Nodes in an Integrity Tree

Leaf nodes to protect must be contiguous in the address space

(5)

Outline

Introduction to memory integrity trees

Past Work:

9 Building a tree over the physical address space (PAS Tree)

9Insecure: branch splicing attack

9 Building a tree over the virtual address space (VAS Tree)

9Impractical

Proposed Approach

9 A novel Reduced Address Space (RAS)

9 Building a tree over the RAS (RAS Tree)

9 Managing the RAS Tree with the Tree Management Unit (TMU)

9 Performance evaluation

(6)

Physical Address Space (PAS) Tree

Majority of past work implements a PAS Tree, where

nodes form a contiguous memory region in the PAS

Problem: with untrusted OS, branch splicing attack

can be carried out

Branch splicing attack: substitution of a leaf data

(7)
(8)
(9)

Outline

Introduction to memory integrity trees

Past Work:

9 Building a tree over the physical address space (PAS Tree)

9Insecure: branch splicing attack

9 Building a tree over the virtual address space (VAS Tree)

9Impractical

Proposed Approach

9 A novel Reduced Address Space (RAS)

9 Building a tree over the RAS (RAS Tree)

9 Managing the RAS Tree with the Tree Management Unit (TMU)

9 Performance evaluation

(10)

Virtual Address Space (VAS) Tree is Too Wide

This leads to huge integrity trees:

- Very large memory capacity overhead - Very large initialization latencies

When OS is untrusted, VAS trees are implemented:

- Tree nodes form a contiguous memory region in the VAS

Problem: Tree must cover huge segment of memory space

(11)
(12)

Outline

Introduction to memory integrity trees

Past Work:

9 Building a tree over the physical address space (PAS Tree)

9Insecure: branch splicing attack

9 Building a tree over the virtual address space (VAS Tree)

9Impractical

Proposed Approach

9 A novel Reduced Address Space (RAS)

9 Building a tree over the RAS (RAS Tree)

9 Managing the RAS Tree with the Tree Management Unit (TMU)

9 Performance evaluation

(13)

Proposed Approach

The Reduced Address Space (RAS): a novel address space containing only pages necessary to the application’s execution

- RAS expands dynamically to fit the application’s memory needs

- RAS contains compact descriptions of memory regions not mapped in RAS, the Unmapped Page Ranges (UPRs)

Compute integrity tree over RAS (a RAS tree) for dramatic reduction of memory and initialization overheads

When application touches a previously unused page, on-chip logic expands RAS and adds branch to RAS tree

(14)

The Reduced Address Space (RAS)

Code Data OS @6 @7 @6 @7 @4 @5 @4 @5 S @2 @3 @2 @3 @0 @1 @0 @1 S = shared library Unused segment (arbitrarily large) @’4 @5 @4 @5 @0 @1 @’4 @5 @2 @3 @6 @7

RAS initially contains the application image authenticated at load-time.

- The RAS index maps a virtual page into the Reduced Address Space

Tree is built over RAS so it spans only useful pages

Page mapped into RAS when application touches it for the first time. Tree root expanded to span new page

Intermediate Tree Nodes

(15)

ghost nodes

Tree Expansion

Full Tree T1 a a 1 RAS_i=0 b RAS_i=1 b c RAS_i=2 c d RAS_i=3 d Partial Tree T3 3

(16)

TLB select branch Protected app D1 va ddr D2 D3 D4 D 5 D6 D7 D8

Branch Splicing Fails on RAS Tree

Root

= branch

Root

? 1

D1, D1 vaddr

= branch

? 6

D6, D1 vaddr

D1 v.addr. D1 p.addr. RAS index D1 v.addr. D1 p.addr. RAS index

(17)

Tree Management Unit

RAS addr = RAS_index || offset

RAS indices mapped bit excluded bit

(18)

Cost Evaluation

Low memory overhead (3 to 10 orders of magnitude reduction over 64-bit VAS!)

Reductions in initialization latency proportional to memory overhead reduction

(19)

Conclusions

We described the branch splicing attack on memory integrity trees.

We provided practical application memory authentication resistant to branch splicing despite an untrusted OS

We reduced memory capacity overhead by 3 to 10 orders of magnitude

We reduced initialization latency by 3 to 10 orders of magnitude

(20)

Thank you

(21)

References

[D. Champagne, R. Elbaz et al.] “The Reduced Address Space (RAS) for Application Memory

Authentication” In Proceedings of the 11th Information Security Conference (ISC’08), September 2008.

[R. Elbaz, D. Champagne et al.] “TEC-Tree: A Low Cost and Parallelizable Tree for Efficient

Defense against Memory Replay Attacks,” Cryptographic Hardware and embedded systems (CHES), September 2007.

[B. Gassend et al.] “Caches and Merkle Trees for Efficient Memory Authentication,” High

Performance Computer Architecture (HPCA-9), February 2003.

[R. Merkle] “Protocols for Public Key Cryptosystems,” IEEE Symposium on Security and Privacy,

1980.

[G. E. Suh et al.] “AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing,”

Proc. of the 17th Int’l Conf. on Supercomputing (ICS), 2003.

[C. Yan et al.] “Improving Cost, Performance, and Security of Memory Encryption and

(22)
(23)

Root Recomputation Equations

COMP1 = h h h COMP2 = h h h COMP3 = h h h COMP4 = h h h COMP5 = h h h COMP6 = h h h COMP7 = h h h COMP8 = h h h Leaf Position to Verify 1 2 3 4 5 6 7 8

Root Recomputation Performed by On-chip Authentication Engine

COMP1 COMP2 COMP3 COMP4 COMP5 COMP6 COMP7 COMP8

X recomputed on-chip X fetched from memory X leaf to verify (fetched from memory)

(24)

Branch Splicing Attack

Core Protected application CPU chip P(D1) OK Compute COMP7 Compute COMP1 PAS Tree Branch Recomputation:

VAS Tree Branch Recomputation:

Core Protected application CPU chip D1, D2, H4, H2 Compute COMP1 re-comp’d root ?= Memory Node addr. TLB translation Memory Node addr. ? = Root Register re-comp’d root

References

Related documents

This utility function U is composed of two terms: the observed element is a linear combination of individual characteristics X (like age, gender and education level),

Applied enzymatic activities of immobilized laccases for the oxidation of target substances at pH 7 varied depending on laccase origin and substrate and were between 1,000 and 42,000

The new business system audit programs and the new follow-up audit report can be used to perform and report on audits of the contractor’s corrective actions related to significant

Click-to-Run also requires administrative rights during installation; if this requirement cannot be met, a volume license version of Office Professional Plus 2013 must be

The Greater Chicago Midwest Higher Education Recruitment Consortium (GCM HERC) is a regional chapter of a national non-profit consortium of forward-looking colleges, univers iti

Corporate  governance  transcends  corporations.  It  is  about  how  the  economy’s  capital  and  resources  are  allocated;  and  about  information 

Figure 2: The Overall Research Design Introductory Research Stream •Overview Article 1 (I1): "Szenarioplanung" (WISU) •Overview Article 2 (I2): “Szenarioplanung

• Remote appearance systems (videoconferencing) • Evidence presentation • Court record • Courtroom data • Control systems • Infrastructure COMMUNICATIONS..