Loading…
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security
Sensitive resources in Trusted Execution Environment (TEE) have suffered serious security threats in recent years. Previous protection approaches either lack a strong assurance of TEE security properties or are limited to a single platform. We propose a compatible verified TEE architecture, called C...
Saved in:
Published in: | IEEE transactions on dependable and secure computing 2023-01, Vol.20 (1), p.377-391 |
---|---|
Main Authors: | , , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c245t-f0ed985ccf0c126ae5da876f53be9fa8a78f0b9352b1b4d2fd2869c5bb6f5cb33 |
container_end_page | 391 |
container_issue | 1 |
container_start_page | 377 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 20 |
creator | Miao, Xinliang Chang, Rui Zhao, Jianhong Zhao, Yongwang Cao, Shuang Wei, Tao Jiang, Liehui Ren, Kui |
description | Sensitive resources in Trusted Execution Environment (TEE) have suffered serious security threats in recent years. Previous protection approaches either lack a strong assurance of TEE security properties or are limited to a single platform. We propose a compatible verified TEE architecture, called CVTEE , which delegates a security monitor to manage TEE resources securely. This architecture has two key advantages: i) its functional correctness and security are guaranteed by a machine-checkable proof of security objectives of Trusted Application (TA) isolation, runtime confidentiality, and runtime integrity, and ii) it is applicable to different TEE platforms and implementation-independent due to its high level of abstraction and non-determinism of data types. Note that access control policy and information flow control policy are the core for security management of resources. After formally specifying the security attributes of TEE resources, we develop these policies based on Common Criteria (CC) in the security monitor and provide atomic interfaces. CVTEE is formally verified with 386 lemmas/theorems and \sim ∼ 10,000 LOC of Isabelle/HOL. In addition, we implement a proof of concept for the access control module of Teaclave, and prove that the constructed access control model meets the security requirements through 5 theorems. |
doi_str_mv | 10.1109/TDSC.2021.3133576 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_9645265</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9645265</ieee_id><sourcerecordid>2765185950</sourcerecordid><originalsourceid>FETCH-LOGICAL-c245t-f0ed985ccf0c126ae5da876f53be9fa8a78f0b9352b1b4d2fd2869c5bb6f5cb33</originalsourceid><addsrcrecordid>eNo9kMtqwzAQRUVpoWnaDyjdGLp2qofHlroLjvuAQBdJ06WQ5BFRSOJUthf5-zokdDUD99wZOIQ8MjphjKqX5WxRTjjlbCKYEFDkV2TEVMZSSpm8HnbIIAVVsFty17YbSnkmVTYis3K1rKrXZJqUze5gumC3mKwwBh-wToYomUa3Dh26ro-Y_IRunVT7tdm7IV6g62Pojvfkxpttiw-XOSbfb9Wy_EjnX--f5XSeOp5Bl3qKtZLgnKeO8dwg1EYWuQdhUXkjTSE9tUoAt8xmNfc1l7lyYO3AOCvEmDyf7x5i89tj2-lN08f98FLzIgcmQQEdKHamXGzaNqLXhxh2Jh41o_okS59k6ZMsfZE1dJ7OnYCI_7zKM-A5iD9c4GSZ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2765185950</pqid></control><display><type>article</type><title>CVTEE: A Compatible Verified TEE Architecture With Enhanced Security</title><source>IEEE Xplore (Online service)</source><creator>Miao, Xinliang ; Chang, Rui ; Zhao, Jianhong ; Zhao, Yongwang ; Cao, Shuang ; Wei, Tao ; Jiang, Liehui ; Ren, Kui</creator><creatorcontrib>Miao, Xinliang ; Chang, Rui ; Zhao, Jianhong ; Zhao, Yongwang ; Cao, Shuang ; Wei, Tao ; Jiang, Liehui ; Ren, Kui</creatorcontrib><description><![CDATA[Sensitive resources in Trusted Execution Environment (TEE) have suffered serious security threats in recent years. Previous protection approaches either lack a strong assurance of TEE security properties or are limited to a single platform. We propose a compatible verified TEE architecture, called CVTEE , which delegates a security monitor to manage TEE resources securely. This architecture has two key advantages: i) its functional correctness and security are guaranteed by a machine-checkable proof of security objectives of Trusted Application (TA) isolation, runtime confidentiality, and runtime integrity, and ii) it is applicable to different TEE platforms and implementation-independent due to its high level of abstraction and non-determinism of data types. Note that access control policy and information flow control policy are the core for security management of resources. After formally specifying the security attributes of TEE resources, we develop these policies based on Common Criteria (CC) in the security monitor and provide atomic interfaces. CVTEE is formally verified with 386 lemmas/theorems and <inline-formula><tex-math notation="LaTeX">\sim</tex-math> <mml:math><mml:mo>∼</mml:mo></mml:math><inline-graphic xlink:href="chang-ieq1-3133576.gif"/> </inline-formula> 10,000 LOC of Isabelle/HOL. In addition, we implement a proof of concept for the access control module of Teaclave, and prove that the constructed access control model meets the security requirements through 5 theorems.]]></description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2021.3133576</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Access control ; Computer architecture ; Flow control ; formal verification ; functional specification ; Information flow ; Kernel ; Microprogramming ; Monitoring ; Runtime ; Security ; Security management ; security monitor ; Theorems ; Trusted execution environment</subject><ispartof>IEEE transactions on dependable and secure computing, 2023-01, Vol.20 (1), p.377-391</ispartof><rights>Copyright IEEE Computer Society 2023</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c245t-f0ed985ccf0c126ae5da876f53be9fa8a78f0b9352b1b4d2fd2869c5bb6f5cb33</cites><orcidid>0000-0002-0178-0171 ; 0000-0002-1969-2591 ; 0000-0003-2798-0873</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9645265$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,54777</link.rule.ids></links><search><creatorcontrib>Miao, Xinliang</creatorcontrib><creatorcontrib>Chang, Rui</creatorcontrib><creatorcontrib>Zhao, Jianhong</creatorcontrib><creatorcontrib>Zhao, Yongwang</creatorcontrib><creatorcontrib>Cao, Shuang</creatorcontrib><creatorcontrib>Wei, Tao</creatorcontrib><creatorcontrib>Jiang, Liehui</creatorcontrib><creatorcontrib>Ren, Kui</creatorcontrib><title>CVTEE: A Compatible Verified TEE Architecture With Enhanced Security</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description><![CDATA[Sensitive resources in Trusted Execution Environment (TEE) have suffered serious security threats in recent years. Previous protection approaches either lack a strong assurance of TEE security properties or are limited to a single platform. We propose a compatible verified TEE architecture, called CVTEE , which delegates a security monitor to manage TEE resources securely. This architecture has two key advantages: i) its functional correctness and security are guaranteed by a machine-checkable proof of security objectives of Trusted Application (TA) isolation, runtime confidentiality, and runtime integrity, and ii) it is applicable to different TEE platforms and implementation-independent due to its high level of abstraction and non-determinism of data types. Note that access control policy and information flow control policy are the core for security management of resources. After formally specifying the security attributes of TEE resources, we develop these policies based on Common Criteria (CC) in the security monitor and provide atomic interfaces. CVTEE is formally verified with 386 lemmas/theorems and <inline-formula><tex-math notation="LaTeX">\sim</tex-math> <mml:math><mml:mo>∼</mml:mo></mml:math><inline-graphic xlink:href="chang-ieq1-3133576.gif"/> </inline-formula> 10,000 LOC of Isabelle/HOL. In addition, we implement a proof of concept for the access control module of Teaclave, and prove that the constructed access control model meets the security requirements through 5 theorems.]]></description><subject>Access control</subject><subject>Computer architecture</subject><subject>Flow control</subject><subject>formal verification</subject><subject>functional specification</subject><subject>Information flow</subject><subject>Kernel</subject><subject>Microprogramming</subject><subject>Monitoring</subject><subject>Runtime</subject><subject>Security</subject><subject>Security management</subject><subject>security monitor</subject><subject>Theorems</subject><subject>Trusted execution environment</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNo9kMtqwzAQRUVpoWnaDyjdGLp2qofHlroLjvuAQBdJ06WQ5BFRSOJUthf5-zokdDUD99wZOIQ8MjphjKqX5WxRTjjlbCKYEFDkV2TEVMZSSpm8HnbIIAVVsFty17YbSnkmVTYis3K1rKrXZJqUze5gumC3mKwwBh-wToYomUa3Dh26ro-Y_IRunVT7tdm7IV6g62Pojvfkxpttiw-XOSbfb9Wy_EjnX--f5XSeOp5Bl3qKtZLgnKeO8dwg1EYWuQdhUXkjTSE9tUoAt8xmNfc1l7lyYO3AOCvEmDyf7x5i89tj2-lN08f98FLzIgcmQQEdKHamXGzaNqLXhxh2Jh41o_okS59k6ZMsfZE1dJ7OnYCI_7zKM-A5iD9c4GSZ</recordid><startdate>202301</startdate><enddate>202301</enddate><creator>Miao, Xinliang</creator><creator>Chang, Rui</creator><creator>Zhao, Jianhong</creator><creator>Zhao, Yongwang</creator><creator>Cao, Shuang</creator><creator>Wei, Tao</creator><creator>Jiang, Liehui</creator><creator>Ren, Kui</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><orcidid>https://orcid.org/0000-0002-0178-0171</orcidid><orcidid>https://orcid.org/0000-0002-1969-2591</orcidid><orcidid>https://orcid.org/0000-0003-2798-0873</orcidid></search><sort><creationdate>202301</creationdate><title>CVTEE: A Compatible Verified TEE Architecture With Enhanced Security</title><author>Miao, Xinliang ; Chang, Rui ; Zhao, Jianhong ; Zhao, Yongwang ; Cao, Shuang ; Wei, Tao ; Jiang, Liehui ; Ren, Kui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c245t-f0ed985ccf0c126ae5da876f53be9fa8a78f0b9352b1b4d2fd2869c5bb6f5cb33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Access control</topic><topic>Computer architecture</topic><topic>Flow control</topic><topic>formal verification</topic><topic>functional specification</topic><topic>Information flow</topic><topic>Kernel</topic><topic>Microprogramming</topic><topic>Monitoring</topic><topic>Runtime</topic><topic>Security</topic><topic>Security management</topic><topic>security monitor</topic><topic>Theorems</topic><topic>Trusted execution environment</topic><toplevel>online_resources</toplevel><creatorcontrib>Miao, Xinliang</creatorcontrib><creatorcontrib>Chang, Rui</creatorcontrib><creatorcontrib>Zhao, Jianhong</creatorcontrib><creatorcontrib>Zhao, Yongwang</creatorcontrib><creatorcontrib>Cao, Shuang</creatorcontrib><creatorcontrib>Wei, Tao</creatorcontrib><creatorcontrib>Jiang, Liehui</creatorcontrib><creatorcontrib>Ren, Kui</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Miao, Xinliang</au><au>Chang, Rui</au><au>Zhao, Jianhong</au><au>Zhao, Yongwang</au><au>Cao, Shuang</au><au>Wei, Tao</au><au>Jiang, Liehui</au><au>Ren, Kui</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>CVTEE: A Compatible Verified TEE Architecture With Enhanced Security</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2023-01</date><risdate>2023</risdate><volume>20</volume><issue>1</issue><spage>377</spage><epage>391</epage><pages>377-391</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract><![CDATA[Sensitive resources in Trusted Execution Environment (TEE) have suffered serious security threats in recent years. Previous protection approaches either lack a strong assurance of TEE security properties or are limited to a single platform. We propose a compatible verified TEE architecture, called CVTEE , which delegates a security monitor to manage TEE resources securely. This architecture has two key advantages: i) its functional correctness and security are guaranteed by a machine-checkable proof of security objectives of Trusted Application (TA) isolation, runtime confidentiality, and runtime integrity, and ii) it is applicable to different TEE platforms and implementation-independent due to its high level of abstraction and non-determinism of data types. Note that access control policy and information flow control policy are the core for security management of resources. After formally specifying the security attributes of TEE resources, we develop these policies based on Common Criteria (CC) in the security monitor and provide atomic interfaces. CVTEE is formally verified with 386 lemmas/theorems and <inline-formula><tex-math notation="LaTeX">\sim</tex-math> <mml:math><mml:mo>∼</mml:mo></mml:math><inline-graphic xlink:href="chang-ieq1-3133576.gif"/> </inline-formula> 10,000 LOC of Isabelle/HOL. In addition, we implement a proof of concept for the access control module of Teaclave, and prove that the constructed access control model meets the security requirements through 5 theorems.]]></abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2021.3133576</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-0178-0171</orcidid><orcidid>https://orcid.org/0000-0002-1969-2591</orcidid><orcidid>https://orcid.org/0000-0003-2798-0873</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2023-01, Vol.20 (1), p.377-391 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_ieee_primary_9645265 |
source | IEEE Xplore (Online service) |
subjects | Access control Computer architecture Flow control formal verification functional specification Information flow Kernel Microprogramming Monitoring Runtime Security Security management security monitor Theorems Trusted execution environment |
title | CVTEE: A Compatible Verified TEE Architecture With Enhanced Security |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T23%3A46%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=CVTEE:%20A%20Compatible%20Verified%20TEE%20Architecture%20With%20Enhanced%20Security&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Miao,%20Xinliang&rft.date=2023-01&rft.volume=20&rft.issue=1&rft.spage=377&rft.epage=391&rft.pages=377-391&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2021.3133576&rft_dat=%3Cproquest_ieee_%3E2765185950%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c245t-f0ed985ccf0c126ae5da876f53be9fa8a78f0b9352b1b4d2fd2869c5bb6f5cb33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2765185950&rft_id=info:pmid/&rft_ieee_id=9645265&rfr_iscdi=true |