skip to main content
10.1145/3615366.3615419acmotherconferencesArticle/Chapter ViewAbstractPublication PagesladcConference Proceedingsconference-collections
research-article

Attesting AMD SEV-SNP Virtual Machines with SPIRE

Authors Info & Claims
Published:17 October 2023Publication History

ABSTRACT

SPIRE is an open-source project that enables the provisioning of verifiable identities to software components based on an attestation of the software properties, avoiding the leakage risks of pre-provisioned secrets. This paper presents an implementation of a SPIRE plugin that enables the attestation of AMD SEV-SNP confidential virtual machines. Our approach leverages the pluggable architecture from SPIRE and depends only on minor changes to QEMU, changes taken from its open-source community, and that should soon be merged. As a result, application providers can now use SPIRE to restrict sensitive credentials to be available only to services in environments protected from malicious hosts and cloud operators using AMD SEV-SNP technology. Our experiments show that the steps needed to create and attest the confidential VM do not prohibitively increase boot times (from 10.8 to 20.9 seconds) and that confidential VMs with encrypted disks only slightly degrade the CPU and RAM performance (about ) of unmodified applications.

References

  1. AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. Technical Report.Google ScholarGoogle Scholar
  2. AMD. 2022. SEV Secure Nested Paging Firmware ABI Specification. Technical Report.Google ScholarGoogle Scholar
  3. AMD. 2023. AMD SEV-TIO: Trusted I/O for Secure Encrypted Virtualization. Technical Report.Google ScholarGoogle Scholar
  4. W. Arthur and D. Challener. 2015. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress.Google ScholarGoogle Scholar
  5. Victor Costan and Srinivas Devadas. 2016. Intel sgx explained.IACR Cryptol. ePrint Arch. 2016, 86 (2016), 1–118.Google ScholarGoogle Scholar
  6. Jordi Cucurull and Sandra Guasch. 2014. Virtual TPM for a secure cloud: fallacy or reality? (2014).Google ScholarGoogle Scholar
  7. Cybersecurity and Infrastructure Security Agency. 2021. SECURITY GUIDANCE FOR 5G CLOUD INFRASTRUCTURES - Part II: Securely Isolate Network Resources. https://www.cisa.gov/sites/default/files/publications/Security_Guidance_For_5G_Cloud_Infrastructures_Part_II_Updated_508_Compliant.pdf. Accessed: 2023-05-13.Google ScholarGoogle Scholar
  8. Cybersecurity and Infrastructure Security Agency. 2023. Zero Trust Maturity Model. https://www.cisa.gov/zero-trust-maturity-model. Accessed: 2023-05-13.Google ScholarGoogle Scholar
  9. Eduardo Falcão, Matteus Silva, Ariel Luz, and Andrey Brito. 2022. Supporting Confidential Workloads in SPIRE. In 2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 186–193. https://doi.org/10.1109/CloudCom55334.2022.00035Google ScholarGoogle ScholarCross RefCross Ref
  10. Daniel Feldman, Emily Fox, Evan Gilman, Ian Haken, Frederick Kautz, Umair Khan, Max Lambrecht, Brandon Lum, Agustín M. Fayó, Eli Nesterov, Andres Vega, and Michael Wardrop. 2020. Solving the Bottom Turtle: a SPIFFE way to establish trust in your infrastructure via universal identity.Google ScholarGoogle Scholar
  11. Dennis Gannon, Roger Barga, and Neel Sundaresan. 2017. Cloud-Native Applications. IEEE Cloud Computing 4, 5 (2017), 16–21. https://doi.org/10.1109/MCC.2017.4250939Google ScholarGoogle ScholarCross RefCross Ref
  12. ITU-T Study Group 17. 2023. Determined new Recommendation ITU-T X.1644 (X.sgdc): Security Guidelines for distributed cloud. https://spiffe.io/docs/latest/spire-about/spire-concepts/.Google ScholarGoogle Scholar
  13. Joseph R. Biden Jr.2021. Improving the nation’s cybersecurity. National Archives and Records Administration, College Park, MD, USA, Executive order 14028. https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/. Accessed: 2023-05-13.Google ScholarGoogle Scholar
  14. Hagen Lauer, Amin Sakzad, Carsten Rudolph, and Surya Nepal. 2019. Bootstrapping Trust in a "Trusted" Virtualized Platform. In Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race (London, United Kingdom) (CYSARM’19). Association for Computing Machinery, New York, NY, USA, 11–22. https://doi.org/10.1145/3338511.3357347Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, and Yinqian Zhang. 2022. A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP. In 2022 IEEE Symposium on Security and Privacy (SP). 337–351. https://doi.org/10.1109/SP46214.2022.9833768Google ScholarGoogle ScholarCross RefCross Ref
  16. Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, and Yan Solihin. 2019. Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1257–1272. https://www.usenix.org/conference/usenixsecurity19/presentation/li-mengyuanGoogle ScholarGoogle Scholar
  17. Wojciech Ozga, Do Le Quoc, and Christof Fetzer. 2021. TRIGLAV: Remote Attestation of the Virtual Machine’s Runtime Integrity in Public Clouds. In 2021 IEEE 14th International Conference on Cloud Computing (CLOUD). 1–12. https://doi.org/10.1109/CLOUD53861.2021.00013Google ScholarGoogle ScholarCross RefCross Ref
  18. Bryan Parno. 2008. Bootstrapping Trust in a "Trusted" Platform. In Proceedings of the 3rd Conference on Hot Topics in Security (San Jose, CA) (HOTSEC’08). USENIX Association, USA, Article 9, 6 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Scott Rose, Oliver Borchert, Stuart Mitchell, and Sean Connelly. 2020. Zero Trust Architecture. Technical Report NIST Special Publication (SP). National Institute of Standards and Technology, Gaithersburg, MD. https://doi.org/10.6028/NIST.SP.800-207Google ScholarGoogle Scholar
  20. SPIFFE. 2023. SPIRE Concepts. https://www.itu.int/md/T22-SG17-R-0021/en. Accessed: 2023-09-06.Google ScholarGoogle Scholar
  21. Marcela Tassyany, Ramon Sarmento, Eduardo Falcão, Reinaldo Gomes, and Andrey Brito. 2021. Um Mecanismo de aprovisionamento de Identidades para Microsserviços Baseado na Integridade do Ambiente de Execução. In Anais do XXXIX Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (Uberlândia). SBC, Porto Alegre, RS, Brasil, 714–727. https://doi.org/10.5753/sbrc.2021.16758Google ScholarGoogle ScholarCross RefCross Ref
  22. Rory Ward and Betsy Beyer. 2014. BeyondCorp: A new approach to enterprise security. (2014). https://storage.googleapis.com/pub-tools-public-publication-data/pdf/43231.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Attesting AMD SEV-SNP Virtual Machines with SPIRE

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          LADC '23: Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing
          October 2023
          242 pages
          ISBN:9798400708442
          DOI:10.1145/3615366

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 October 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format