TY - JOUR
T1 - Open-Source Hardware Memory Protection Engine Integrated with NVMM Simulator
AU - Omori, Yu
AU - Kimura, Keiji
N1 - Publisher Copyright:
IEEE
PY - 2022
Y1 - 2022
N2 - With growing on-device IoT processing, security on edge devices becomes increasingly important. Among Trusted Execution Environment (TEE), an open-source RISC-V Keystone TEE is the expected one. However, some issues remain when applying it to various devices: untrusted DRAM, and untrusted path to non-volatile storage. These issues can be resolved by Memory Protection Engine (MPE) based on an integrity tree, and Non-Volatile Main Memory (NVMM), respectively. TEE, MPE, and NVMM must be cooperatively optimized to exploit performance. Despite this demand, there is no widely available platform which enables fast, reliable, and system-wide evaluation. In the paper, we provide an open-source hardware simulator for secure edge devices. We implemented an MPE using SGX-style Integrity Tree on the Keystone compatible RISC-V SoC. Then, we ported the NVMM simulation technique to it. Its whole design was publicized to widely provide a baseline hardware design. The MPE behavior was validated by using micro benchmarks. It revealed that the MPE read/write overhead is $2.55\times /4.16\times$ on DRAM, and $3.05\times /5.40\times$ on NVMM, respectively. Besides, we discuss our work's role by comparing with the gem5 considering TEE evaluation time and impact of the protected NVMM.
AB - With growing on-device IoT processing, security on edge devices becomes increasingly important. Among Trusted Execution Environment (TEE), an open-source RISC-V Keystone TEE is the expected one. However, some issues remain when applying it to various devices: untrusted DRAM, and untrusted path to non-volatile storage. These issues can be resolved by Memory Protection Engine (MPE) based on an integrity tree, and Non-Volatile Main Memory (NVMM), respectively. TEE, MPE, and NVMM must be cooperatively optimized to exploit performance. Despite this demand, there is no widely available platform which enables fast, reliable, and system-wide evaluation. In the paper, we provide an open-source hardware simulator for secure edge devices. We implemented an MPE using SGX-style Integrity Tree on the Keystone compatible RISC-V SoC. Then, we ported the NVMM simulation technique to it. Its whole design was publicized to widely provide a baseline hardware design. The MPE behavior was validated by using micro benchmarks. It revealed that the MPE read/write overhead is $2.55\times /4.16\times$ on DRAM, and $3.05\times /5.40\times$ on NVMM, respectively. Besides, we discuss our work's role by comparing with the gem5 considering TEE evaluation time and impact of the protected NVMM.
KW - Emulator
KW - Encryption
KW - Field programmable gate arrays
KW - Hardware
KW - Memory Encryption
KW - Memory Integrity
KW - Nonvolatile memory
KW - NVMM
KW - Open source software
KW - Optimization
KW - RISC-V
KW - Simulator
KW - System-on-chip
UR - http://www.scopus.com/inward/record.url?scp=85135987921&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85135987921&partnerID=8YFLogxK
U2 - 10.1109/LCA.2022.3197777
DO - 10.1109/LCA.2022.3197777
M3 - Article
AN - SCOPUS:85135987921
SP - 1
EP - 4
JO - IEEE Computer Architecture Letters
JF - IEEE Computer Architecture Letters
SN - 1556-6056
ER -