Sanctum: Minimal Hardware Extensions for Strong Software Isolation

Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable isolation of software modules running concurrently and sharing resources, but protects against an important class of additional software attacks that infer private information from a program’s memory a...

Full description

Bibliographic Details
Main Authors: Costan, Victor, Lebedev, Ilia, Devadas, Srinivas
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:English
Published: 2021
Online Access:https://hdl.handle.net/1721.1/137536
_version_ 1826189994029481984
author Costan, Victor
Lebedev, Ilia
Devadas, Srinivas
author2 Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
author_facet Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Costan, Victor
Lebedev, Ilia
Devadas, Srinivas
author_sort Costan, Victor
collection MIT
description Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable isolation of software modules running concurrently and sharing resources, but protects against an important class of additional software attacks that infer private information from a program’s memory access patterns. Sanctum shuns unnecessary complexity, leading to a simpler security analysis. We follow a principled approach to eliminating entire attack surfaces through isolation, rather than plugging attack-specific privacy leaks. Most of Sanctum’s logic is implemented in trusted software, which does not perform cryptographic operations using keys, and is easier to analyze than SGX’s opaque microcode, which does. Our prototype targets a Rocket RISC-V core, an open implementation that allows any researcher to reason about its security properties. Sanctum’s extensions can be adapted to other processor cores, because we do not change any major CPU building block. Instead, we add hardware at the interfaces between generic building blocks, without impacting cycle time. Sanctum demonstrates that strong software isolation is achievable with a surprisingly small set of minimally invasive hardware changes, and a very reasonable overhead.
first_indexed 2024-09-23T08:33:23Z
format Article
id mit-1721.1/137536
institution Massachusetts Institute of Technology
language English
last_indexed 2024-09-23T08:33:23Z
publishDate 2021
record_format dspace
spelling mit-1721.1/1375362022-09-23T12:52:11Z Sanctum: Minimal Hardware Extensions for Strong Software Isolation Costan, Victor Lebedev, Ilia Devadas, Srinivas Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable isolation of software modules running concurrently and sharing resources, but protects against an important class of additional software attacks that infer private information from a program’s memory access patterns. Sanctum shuns unnecessary complexity, leading to a simpler security analysis. We follow a principled approach to eliminating entire attack surfaces through isolation, rather than plugging attack-specific privacy leaks. Most of Sanctum’s logic is implemented in trusted software, which does not perform cryptographic operations using keys, and is easier to analyze than SGX’s opaque microcode, which does. Our prototype targets a Rocket RISC-V core, an open implementation that allows any researcher to reason about its security properties. Sanctum’s extensions can be adapted to other processor cores, because we do not change any major CPU building block. Instead, we add hardware at the interfaces between generic building blocks, without impacting cycle time. Sanctum demonstrates that strong software isolation is achievable with a surprisingly small set of minimally invasive hardware changes, and a very reasonable overhead. 2021-11-05T16:22:34Z 2021-11-05T16:22:34Z 2016 2019-05-28T16:17:18Z Article http://purl.org/eprint/type/ConferencePaper https://hdl.handle.net/1721.1/137536 Costan, Victor, Lebedev, Ilia and Devadas, Srinivas. 2016. "Sanctum: Minimal Hardware Extensions for Strong Software Isolation." en https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/costan Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Other repository
spellingShingle Costan, Victor
Lebedev, Ilia
Devadas, Srinivas
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
title Sanctum: Minimal Hardware Extensions for Strong Software Isolation
title_full Sanctum: Minimal Hardware Extensions for Strong Software Isolation
title_fullStr Sanctum: Minimal Hardware Extensions for Strong Software Isolation
title_full_unstemmed Sanctum: Minimal Hardware Extensions for Strong Software Isolation
title_short Sanctum: Minimal Hardware Extensions for Strong Software Isolation
title_sort sanctum minimal hardware extensions for strong software isolation
url https://hdl.handle.net/1721.1/137536
work_keys_str_mv AT costanvictor sanctumminimalhardwareextensionsforstrongsoftwareisolation
AT lebedevilia sanctumminimalhardwareextensionsforstrongsoftwareisolation
AT devadassrinivas sanctumminimalhardwareextensionsforstrongsoftwareisolation