• English
  • Deutsch
  • Log In
    Password Login
    or
  • Research Outputs
  • Projects
  • Researchers
  • Institutes
  • Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Scanclave: Verifying Application Runtime Integrity in Untrusted Environmen
 
  • Details
  • Full
Options
2019
Conference Paper
Titel

Scanclave: Verifying Application Runtime Integrity in Untrusted Environmen

Abstract
Data hosted in a cloud environment can be subject to attacks from a higher privileged adversary, such as a malicious or compromised cloud provider. To provide confidentiality and integrity even in the presence of such an adversary, a number of Trusted Execution Environments (TEEs) have been developed. A TEE aims to protect data and code within its environment against high privileged adversaries, such as a malicious operating system or hypervisor. While mechanisms exist to attest a TEE's integrity at load time, there are no mechanisms to attest its integrity at runtime. Work also exists that discusses mechanisms to verify the runtime integrity of programs and system components. However, those verification mechanisms are themselves not protected against attacks from a high privileged adversary. It is therefore desirable to combine the protection mechanisms of TEEs with the ability of application runtime integrity verification. In this paper, I present Scanclave, a lightweight design which achieves three design goals: Trustworthiness of the verifier, a minimal trusted software stack and the possibility to access an application's memory from a TEE. Having achieved these goals, I am able to verify the runtime integrity of applications even in the presence of a high privileged adversary. I refrain from discussing which properties define the runtime integrity of an application, as different applications will require different verification methods. Instead, I show how Scanclave enables a remote verifier to determine the runtime integrity of an application. Afterwards, I perform a security analysis for the different steps of my design. Additionally, I discuss different enclave implementations that might be used for the implementation of Scanclave.
Author(s)
Morbitzer, M.
Hauptwerk
IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2019. Proceedings
Konferenz
International Conference on Enabling Technologies - Infrastructure for Collaborative Enterprises (WETICE) 2019
Thumbnail Image
DOI
10.1109/WETICE.2019.00050
Language
English
google-scholar
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Send Feedback
© 2022