Visible to the public Comprehensive VM Protection Against Untrusted Hypervisor Through Retrofitted AMD Memory Encryption

TitleComprehensive VM Protection Against Untrusted Hypervisor Through Retrofitted AMD Memory Encryption
Publication TypeConference Paper
Year of Publication2018
AuthorsWu, Yuming, Liu, Yutao, Liu, Ruifeng, Chen, Haibo, Zang, Binyu, Guan, Haibing
Conference Name2018 IEEE International Symposium on High Performance Computer Architecture (HPCA)
Date Published Feb. 2018
PublisherIEEE
ISBN Number978-1-5386-3659-6
KeywordsEncryption, Hardware, Memory management, pubcrawl, science of security, Virtual machine monitors, virtualization
Abstract

The confidentiality of tenant's data is confronted with high risk when facing hardware attacks and privileged malicious software. Hardware-based memory encryption is one of the promising means to provide strong guarantees of data security. Recently AMD has proposed its new memory encryption hardware called SME and SEV, which can selectively encrypt memory regions in a fine-grained manner, e.g., by setting the C-bits in the page table entries. More importantly, SEV further supports encrypted virtual machines. This, intuitively, has provided a new opportunity to protect data confidentiality in guest VMs against an untrusted hypervisor in the cloud environment. In this paper, we first provide a security analysis on the (in)security of SEV and uncover a set of security issues of using SEV as a means to defend against an untrusted hypervisor. Based on the study, we then propose a software-based extension to the SEV feature, namely Fidelius, to address those issues while retaining performance efficiency. Fidelius separates the management of critical resources from service provisioning and revokes the permissions of accessing specific resources from the un-trusted hypervisor. By adopting a sibling-based protection mechanism with non-bypassable memory isolation, Fidelius embraces both security and efficiency, as it introduces no new layer of abstraction. Meanwhile, Fidelius reuses the SEV API to provide a full VM life-cycle protection, including two sets of para-virtualized I/O interfaces to encode the I/O data, which is not considered in the SEV hardware design. A detailed and quantitative security analysis shows its effectiveness in protecting tenant's data from a variety of attack surfaces, and the performance evaluation confirms the performance efficiency of Fidelius.

URLhttps://ieeexplore.ieee.org/document/8327028
DOI10.1109/HPCA.2018.00045
Citation Keywu_comprehensive_2018