Javascript must be enabled to continue!
TREE: Bridging the gap between reconfigurable computing and secure execution
View through CrossRef
Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications. With modern computing systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount. One promising line of research has proposed leveraging FPGA technology to provide promising TEE solutions. Despite their potential, current implementations of FPGA-based TEEs have a set of drawbacks. Some solutions (i.e., MeetGo and ShEF) prioritize the secure loading of reconfigurable modules but lack compatibility with established legacy TEE specifications and services. On the other hand, those that aim to establish legacy compatibility (i.e., TEEOD and BYOTee) fail to fully utilize the dynamic reconfigurability and parallel processing capabilities inherent in FPGAs. In this context, we introduce Trusted Reconfigurable Execution Environments (TREE), a novel framework that fulfills the gaps existing in current FPGA-based TEE approaches. TREE enables system designers to fully leverage the reconfigurability capabilities of FPGAs without compromising compatibility with existing TEE specifications. Our reference TREE implementation ensures secure execution of user-customized hardware, legacy software trusted applications (TAs), and TAs that combine both custom hardware and software components, by fully exploiting the FPGA’s dynamic partial reconfiguration capabilities. TREE’s root of trust relies on conventional SoC-FPGA mechanisms including secure initial reconfiguration and memory protection, to ensure the initial bitstream integrity is kept after loaded and that reconfiguration access is restricted to the FPGA fabric after boot. Additionally, TREE provides essential TEE services within the FPGA fabric, including secure storage and cryptographic functions, enabling TAs to securely store sensitive data and perform critical operations in an isolated environment. Our evaluation on an entry-level FPGA, involved assessing TREE using microbenchmarks and real-world applications to compare its hardware costs and performance speedups against OP-TEE. The results showed that TREE’s hardware costs are minimal, while it achieves significant performance speedups, especially when compared to hardware TAs. For empirical demonstrations, we assess two real-world TA examples on TREE: an access control authenticator and a Bitcoin wallet.
Universitatsbibliothek der Ruhr-Universitat Bochum
Title: TREE: Bridging the gap between reconfigurable computing and secure execution
Description:
Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications.
With modern computing systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount.
One promising line of research has proposed leveraging FPGA technology to provide promising TEE solutions.
Despite their potential, current implementations of FPGA-based TEEs have a set of drawbacks.
Some solutions (i.
e.
, MeetGo and ShEF) prioritize the secure loading of reconfigurable modules but lack compatibility with established legacy TEE specifications and services.
On the other hand, those that aim to establish legacy compatibility (i.
e.
, TEEOD and BYOTee) fail to fully utilize the dynamic reconfigurability and parallel processing capabilities inherent in FPGAs.
In this context, we introduce Trusted Reconfigurable Execution Environments (TREE), a novel framework that fulfills the gaps existing in current FPGA-based TEE approaches.
TREE enables system designers to fully leverage the reconfigurability capabilities of FPGAs without compromising compatibility with existing TEE specifications.
Our reference TREE implementation ensures secure execution of user-customized hardware, legacy software trusted applications (TAs), and TAs that combine both custom hardware and software components, by fully exploiting the FPGA’s dynamic partial reconfiguration capabilities.
TREE’s root of trust relies on conventional SoC-FPGA mechanisms including secure initial reconfiguration and memory protection, to ensure the initial bitstream integrity is kept after loaded and that reconfiguration access is restricted to the FPGA fabric after boot.
Additionally, TREE provides essential TEE services within the FPGA fabric, including secure storage and cryptographic functions, enabling TAs to securely store sensitive data and perform critical operations in an isolated environment.
Our evaluation on an entry-level FPGA, involved assessing TREE using microbenchmarks and real-world applications to compare its hardware costs and performance speedups against OP-TEE.
The results showed that TREE’s hardware costs are minimal, while it achieves significant performance speedups, especially when compared to hardware TAs.
For empirical demonstrations, we assess two real-world TA examples on TREE: an access control authenticator and a Bitcoin wallet.
Related Results
Virtualizable hardware/software design infrastructure for dynamically partially reconfigurable systems
Virtualizable hardware/software design infrastructure for dynamically partially reconfigurable systems
In most existing works, reconfigurable hardware modules are still managed as conventional hardware devices. Further, the software reconfiguration overhead incurred by loading corre...
On bridging paired-end RNA-seq data
On bridging paired-end RNA-seq data
Abstract
Motivation
The widely-used high-throughput RNA-sequencing technologies (RNA-seq) usually produce ...
Recent development in reconfigurable dielectric resonator antenna and microwave filter: design and application
Recent development in reconfigurable dielectric resonator antenna and microwave filter: design and application
SummaryDeveloping wireless communication systems depends on reconfigurable microwave filters (MF) and dielectric resonator antenna (DRA) because the functionality of the various fi...
Understanding the Role and Clinical Management of Bridging Therapy During CAR T-Cell Therapy for Relapsed or Refractory Multiple Myeloma
Understanding the Role and Clinical Management of Bridging Therapy During CAR T-Cell Therapy for Relapsed or Refractory Multiple Myeloma
Background: Chimeric antigen receptor (CAR) T-cell therapy has emerged as a highly effective treatment for relapsed or refractory multiple myeloma (MM). However, manufacturing CAR ...
Reconfigurable antennas for wireless network security
Reconfigurable antennas for wireless network security
Large scale proliferation of wireless technology coupled with the increasingly hostile information security landscape is of serious concern as organizations continue to widely adop...
Inter-specific variations in tree stem methane and nitrous oxide exchanges in a tropical rainforest
Inter-specific variations in tree stem methane and nitrous oxide exchanges in a tropical rainforest
<p>Tropical forests are the most productive terrestrial ecosystems, global centres of biodiversity and important participants in the global carbon and water cycles. T...
Aortic endograft and bridging stent-graft remodeling after branched endovascular aortic repair
Aortic endograft and bridging stent-graft remodeling after branched endovascular aortic repair
Objectives
The results of branched endovascular repair of thoracoabdominal aneurysms are mainly dependent on durability of the graft used. The purpose of this s...
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...

