2018
DOI: 10.1145/3296957.3177155
|View full text |Cite
|
Sign up to set email alerts
|

Vault

Abstract: Intel's SGX o ers state-of-the-art security features, including con dentiality, integrity, and authentication (CIA) when accessing sensitive pages in memory. Sensitive pages are placed in an Enclave Page Cache (EPC) within the physical memory before they can be accessed by the processor. To control the overheads imposed by CIA guarantees, the EPC operates with a limited capacity (currently 128 MB). Because of this limited EPC size, sensitive pages must be frequently swapped between EPC and non-EPC regions in m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…In all our experiments for SECRET-GWAS, except for the EPC sensitivity test in Figure 3c, we did not trigger EPC paging. Recent work shows that increasing the scalability of the EPC is possible [35,36], and Intel has developed new approaches to increase EPC memory in SGX [28] that have recently been added to Azure's cloud offerings. Therefore, we believe that GWAS will be able to support even larger datasets with several million patients as the pace of EPC technology improves.…”
Section: Epc Memory Scalingmentioning
confidence: 99%
See 1 more Smart Citation
“…In all our experiments for SECRET-GWAS, except for the EPC sensitivity test in Figure 3c, we did not trigger EPC paging. Recent work shows that increasing the scalability of the EPC is possible [35,36], and Intel has developed new approaches to increase EPC memory in SGX [28] that have recently been added to Azure's cloud offerings. Therefore, we believe that GWAS will be able to support even larger datasets with several million patients as the pace of EPC technology improves.…”
Section: Epc Memory Scalingmentioning
confidence: 99%
“…SGX, for instance, only provides 128-256 MB of EPC [28]. If an application's working data set size exceeds EPC size, then it triggers EPC paging -an expensive process where encrypted pages are moved back and forth between non-enclave and enclave memory, slowing down programs by 5x on average [35]. Datasets used in population-scale GWAS can be several GBs, which do not directly fit within the EPC.…”
Section: Challengesmentioning
confidence: 99%
“…Therefore, it may not suit the performancesensitive middlebox applications. To help grow EPC in the future, a recent study proposes to refine the underlying data structure for integrity checking [84]. Whether a large EPC can overcome SGX's current performance issue without enlarging the attack surface remains an open problem.…”
Section: Related Workmentioning
confidence: 99%
“…A typical memory encryption scheme (as MEE) consists of MACs/hash functions and Authenticated Encryptions (AEs) composed in a tree for providing replay protection in addition to confidentiality and authenticity [Gue16a, HJ06, RCPS07, IMO + 22]. This type of memory encryption has been extensively studied from the system architecture viewpoint, e.g., [YEP + 06, SNR + 18a, TSB18a,Ava22]. The latency of the cryptographic core inside a memory encryption scheme directly impacts the memory read/write latency, hence it is a critical factor in determining the overall TEE performance.…”
Section: Introductionmentioning
confidence: 99%