Security

OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms

Download Now Free registration required

Executive Summary

Currently, Trusted Platform Module (TPM) based solutions have not reached wide-spread application in security-sensitive contexts, perhaps because TCG solutions lack protection against a more resourceful adversary, lack sufficient properties for end-to-end application protection, lack architectural safeguards against supply-chain compromises, or concerns over poor performance. OASIS offers a stronger degree of protection through highly efficient isolated execution with no hardware dependencies outside the CPU. The authors have explored the extent to which minimal modifications to commodity CPUs can support isolated code execution. The ISA extensions explored in this research enable compute service providers and application developers to provide high security assurance at low cost in terms of platform and software complexity.

  • Format: PDF
  • Size: 0 KB