Abstract
Confidential virtual machines (CVMs) enabled by AMD SEV provide a protected environment for sensitive computations on an untrusted cloud. Unfortunately, CVMs are typically deployed with huge and vulnerable operating system kernels, exposing the CVMs to attacks that exploit kernel vulnerabilities. Veil is a versatile CVM framework that efficiently protects critical system services like shielding sensitive programs, which cannot be entrusted to the buggy kernel. Veil leverages a new hardware primitive, virtual machine privilege levels (VMPL), to install a privileged security monitor inside the CVM. We overcome several challenges in designing Veil, including (a) creating unlimited secure domains with a limited number of VMPLs, (b) establishing resource-efficient domain switches, and (c) maintaining commodity kernel backwardscompatibility with only minor changes. Our evaluation shows that Veil incurs no discernible performance slowdown during normal CVM execution while incurring a modest overhead (2 - 64%) when running its protected services across real-world use cases.
Author supplied keywords
Cite
CITATION STYLE
Ahmad, A., Ou, B., Liu, C., Zhang, X., & Fonseca, P. (2024). Veil: A Protected Services Framework for Confidential Virtual Machines. In International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS (Vol. 4, pp. 378–393). Association for Computing Machinery. https://doi.org/10.1145/3623278.3624763
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.