Veil: A Protected Services Framework for Confidential Virtual Machines

15Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Confidential virtual machines (CVMs) enabled by AMD SEV provide a protected environment for sensitive computations on an untrusted cloud. Unfortunately, CVMs are typically deployed with huge and vulnerable operating system kernels, exposing the CVMs to attacks that exploit kernel vulnerabilities. Veil is a versatile CVM framework that efficiently protects critical system services like shielding sensitive programs, which cannot be entrusted to the buggy kernel. Veil leverages a new hardware primitive, virtual machine privilege levels (VMPL), to install a privileged security monitor inside the CVM. We overcome several challenges in designing Veil, including (a) creating unlimited secure domains with a limited number of VMPLs, (b) establishing resource-efficient domain switches, and (c) maintaining commodity kernel backwardscompatibility with only minor changes. Our evaluation shows that Veil incurs no discernible performance slowdown during normal CVM execution while incurring a modest overhead (2 - 64%) when running its protected services across real-world use cases.

Cite

CITATION STYLE

APA

Ahmad, A., Ou, B., Liu, C., Zhang, X., & Fonseca, P. (2024). Veil: A Protected Services Framework for Confidential Virtual Machines. In International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS (Vol. 4, pp. 378–393). Association for Computing Machinery. https://doi.org/10.1145/3623278.3624763

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free