[PDF][PDF] Besfs: Mechanized proof of an iago-safe filesystem for enclaves

S Shinde, S Wang, P Yuan, A Hobor… - ArXiv e …, 2018 - comp.nus.edu.sg
ArXiv e-prints, 2018comp.nus.edu.sg
New trusted computing primitives such as Intel SGX have shown the feasibility of running
user-level applications in enclaves on a commodity trusted processor without trusting a large
OS. However, the OS can compromise the integrity of the applications via the system call
interface by tampering the return values. This class of attacks (commonly referred to as Iago
attacks) have been shown to be powerful enough to execute arbitrary logic in enclave
programs. To this end, we present BesFS—a formal and provably Iago-safe API specification …
Abstract
New trusted computing primitives such as Intel SGX have shown the feasibility of running user-level applications in enclaves on a commodity trusted processor without trusting a large OS. However, the OS can compromise the integrity of the applications via the system call interface by tampering the return values. This class of attacks (commonly referred to as Iago attacks) have been shown to be powerful enough to execute arbitrary logic in enclave programs. To this end, we present BesFS—a formal and provably Iago-safe API specification for the filesystem subset of the POSIX interface. We prove 118 lemmas and 2 key theorems in 3676 lines of CoQ proof scripts, which directly proves safety properties of BesFS implementation. BesFS API is expressive enough to support 17 real applications we test, and this principled approach eliminates several bugs. BesFS integrates into existing SGX-enabled applications with minimal impact to TCB (less than 750 LOC), and it can serve as concrete test oracle for other hand-coded Iago-safety checks.
comp.nus.edu.sg
以上显示的是最相近的搜索结果。 查看全部搜索结果