-
An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDX
Authors:
Luigi Coppolino,
Salvatore D'Antonio,
Davide Iasio,
Giovanni Mazzeo,
Luigi Romano
Abstract:
Protection of data-in-use is a key priority, for which Trusted Execution Environment (TEE) technology has unarguably emerged as a, possibly the most, promising solution. Multiple server-side TEE offerings have been released over the years, exhibiting substantial differences with respect to several aspects. The first comer was Intel SGX, which featured Process-based TEE protection, an efficient yet…
▽ More
Protection of data-in-use is a key priority, for which Trusted Execution Environment (TEE) technology has unarguably emerged as a, possibly the most, promising solution. Multiple server-side TEE offerings have been released over the years, exhibiting substantial differences with respect to several aspects. The first comer was Intel SGX, which featured Process-based TEE protection, an efficient yet difficult to use approach. Some SGX limitations were (partially) overcome by runtimes, notably: Gramine, Scone, and Occlum. A major paradigm shift was later brought by AMD SEV, with VM-based TEE protection, which enabled lift-and-shift deployment of legacy applications. This new paradigm has been implemented by Intel only recently, in TDX. While the threat model of the aforementioned TEE solutions has been widely discussed, a thorough performance comparison is still lacking in the literature. This paper provides a comparative evaluation of TDX, SEV, Gramine-SGX, and Occlum-SGX. We study computational overhead and resource usage, under different operational scenarios and using a diverse suite of legacy applications. By doing so, we provide a reliable performance assessment under realistic conditions. We explicitly emphasize that, at the time of writing, TDX was not yet available to the public. Thus, the evaluation of TDX is a unique feature of this study.
△ Less
Submitted 1 August, 2024;
originally announced August 2024.
-
A Comprehensive Trusted Runtime for WebAssembly with Intel SGX
Authors:
Jämes Ménétrey,
Marcelo Pasin,
Pascal Felber,
Valerio Schiavoni,
Giovanni Mazzeo,
Arne Hollum,
Darshan Vaydia
Abstract:
In real-world scenarios, trusted execution environments (TEEs) frequently host applications that lack the trust of the infrastructure provider, as well as data owners who have specifically outsourced their data for remote processing. We present Twine, a trusted runtime for running WebAssembly-compiled applications within TEEs, establishing a two-way sandbox. Twine leverages memory safety guarantee…
▽ More
In real-world scenarios, trusted execution environments (TEEs) frequently host applications that lack the trust of the infrastructure provider, as well as data owners who have specifically outsourced their data for remote processing. We present Twine, a trusted runtime for running WebAssembly-compiled applications within TEEs, establishing a two-way sandbox. Twine leverages memory safety guarantees of WebAssembly (Wasm) and abstracts the complexity of TEEs, empowering the execution of legacy and language-agnostic applications. It extends the standard WebAssembly system interface (WASI), providing controlled OS services, focusing on I/O. Additionally, through built-in TEE mechanisms, Twine delivers attestation capabilities to ensure the integrity of the runtime and the OS services supplied to the application. We evaluate its performance using general-purpose benchmarks and real-world applications, showing it compares on par with state-of-the-art solutions. A case study involving fintech company Credora reveals that Twine can be deployed in production with reasonable performance trade-offs, ranging from a 0.7x slowdown to a 1.17x speedup compared to native run time. Finally, we identify performance improvement through library optimisation, showcasing one such adjustment that leads up to 4.1x speedup. Twine is open-source and has been upstreamed into the original Wasm runtime, WAMR.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Privacy-preserving Credit Scoring via Functional Encryption
Authors:
Lorenzo Andolfo,
Luigi Coppolino,
Salvatore D'Antonio,
Giovanni Mazzeo,
Luigi Romano,
Matthew Ficke,
Arne Hollum,
Darshan Vaydia
Abstract:
The majority of financial organizations managing confidential data are aware of security threats and leverage widely accepted solutions (e.g., storage encryption, transport-level encryption, intrusion detection systems) to prevent or detect attacks. Yet these hardening measures do little to face even worse threats posed on data-in-use. Solutions such as Homomorphic Encryption (HE) and hardware-ass…
▽ More
The majority of financial organizations managing confidential data are aware of security threats and leverage widely accepted solutions (e.g., storage encryption, transport-level encryption, intrusion detection systems) to prevent or detect attacks. Yet these hardening measures do little to face even worse threats posed on data-in-use. Solutions such as Homomorphic Encryption (HE) and hardware-assisted Trusted Execution Environment (TEE) are nowadays among the preferred approaches for mitigating this type of threat. However, given the high-performance overhead of HE, financial institutions -- whose processing rate requirements are stringent -- are more oriented towards TEE-based solutions. The X-Margin Inc. company, for example, offers secure financial computations by combining the Intel SGX TEE technology and HE-based Zero-Knowledge Proofs, which shield customers' data-in-use even against malicious insiders, i.e., users having privileged access to the system. Despite such a solution offers strong security guarantees, it is constrained by having to trust Intel and by the SGX hardware extension availability. In this paper, we evaluate a new frontier for X-Margin, i.e., performing privacy-preserving credit risk scoring via an emerging cryptographic scheme: Functional Encryption (FE), which allows a user to only learn a function of the encrypted data. We describe how the X-Margin application can benefit from this innovative approach and -- most importantly -- evaluate its performance impact.
△ Less
Submitted 22 September, 2021;
originally announced September 2021.
-
Isolating Real-Time Safety-Critical Embedded Systems via SGX-based Lightweight Virtualization
Authors:
Luigi De Simone,
Giovanni Mazzeo
Abstract:
A promising approach for designing critical embedded systems is based on virtualization technologies and multi-core platforms. These enable the deployment of both real-time and general-purpose systems with different criticalities in a single host. Integrating virtualization while also meeting the real-time and isolation requirements is non-trivial, and poses significant challenges especially in te…
▽ More
A promising approach for designing critical embedded systems is based on virtualization technologies and multi-core platforms. These enable the deployment of both real-time and general-purpose systems with different criticalities in a single host. Integrating virtualization while also meeting the real-time and isolation requirements is non-trivial, and poses significant challenges especially in terms of certification. In recent years, researchers proposed hardware-assisted solutions to face issues coming from virtualization, and recently the use of Operating System (OS) virtualization as a more lightweight approach. Industries are hampered in leveraging this latter type of virtualization despite the clear benefits it introduces, such as reduced overhead, higher scalability, and effortless certification since there is still lack of approaches to address drawbacks. In this position paper, we propose the usage of Intel's CPU security extension, namely SGX, to enable the adoption of enclaves based on unikernel, a flavor of OS-level virtualization, in the context of real-time systems. We present the advantages of leveraging both the SGX isolation and the unikernel features in order to meet the requirements of safety-critical real-time systems and ease the certification process.
△ Less
Submitted 20 September, 2019;
originally announced September 2019.
-
Plasmonic superchiral lattice resonances in the mid-infrared
Authors:
Francesco Mattioli,
Giuseppe Mazzeo,
Giovanna Longhi,
Sergio Abbate,
Giovanni Pellegrini,
Michele Celebrano,
Marco Finazzi,
Lamberto Duò,
Chiara Zanchi,
Matteo Tommasini,
Marialilia Pea,
Sara Cibella,
Filippo Sciortino,
Leonetta Baldassarre,
Alessandro Nucara,
Michele Ortolani,
Paolo Biagioni
Abstract:
Recent efforts in the field of surface-enhanced spectroscopies have focused on the paradigm of superchirality, entailing the engineering of the local electromagnetic fields to boost the enantiospecific interaction between light and chiral molecules. In this framework, approaches based on both metallic and dielectric nanostructures have been proposed and have also recently been extended to vibratio…
▽ More
Recent efforts in the field of surface-enhanced spectroscopies have focused on the paradigm of superchirality, entailing the engineering of the local electromagnetic fields to boost the enantiospecific interaction between light and chiral molecules. In this framework, approaches based on both metallic and dielectric nanostructures have been proposed and have also recently been extended to vibrational circular dichroism in the mid-infrared. In this work, we design, fabricate and characterize arrays of chiral plasmonic slits featuring enhanced chiral fields in the mid-infrared. We exploit collective lattice resonances to further enhance the local intensity and to generate sharp features in the circular dichroism spectra of the platform. Such features are ideally suited to test the superchiral coupling with the vibrational resonances of chiral molecules.
△ Less
Submitted 8 July, 2019;
originally announced July 2019.
-
Valley blockade and multielectron spin-valley Kondo effect in silicon
Authors:
A. Crippa,
M. L. V. Tagliaferri,
D. Rotta,
M. De Michielis,
G. Mazzeo,
M. Fanciulli,
R. Wacquez,
M. Vinet,
E. Prati
Abstract:
We report on the valley blockade and the multielectron Kondo effect generated by an impurity atom in a silicon nano field effect device. According to the spin-valley nature of tunnelling processes, and consistently with those allowed by the valley blockade regime, the manifestation of Kondo effect obeys to the periodicity 4 of the electron filling sequence typical of silicon emerging at occupation…
▽ More
We report on the valley blockade and the multielectron Kondo effect generated by an impurity atom in a silicon nano field effect device. According to the spin-valley nature of tunnelling processes, and consistently with those allowed by the valley blockade regime, the manifestation of Kondo effect obeys to the periodicity 4 of the electron filling sequence typical of silicon emerging at occupation N=1, 2, 3. The spin-valley Kondo effect emerges under different kinds of screening depending on the electron filling. By exploiting the valley blockade regime, valley index conservation in the Kondo SU(4) is deduced without the employment of an external magnetic field. Microwave irradiation suppresses the Kondo effect at occupancies up to three electrons.
△ Less
Submitted 29 April, 2015; v1 submitted 12 January, 2015;
originally announced January 2015.
-
Effective Hamiltonian for the hybrid double quantum dot qubit
Authors:
E. Ferraro,
M. De Michielis,
G. Mazzeo,
M. Fanciulli,
E. Prati
Abstract:
Quantum dot hybrid qubits formed from three electrons in double quantum dots represent a promising compromise between high speed and simple fabrication for solid state implementations of single qubit and two qubits quantum logic ports. We derive the Schrieffer-Wolff effective Hamiltonian that describes in a simple and intuitive way the qubit by combining a Hubbard-like model with a projector opera…
▽ More
Quantum dot hybrid qubits formed from three electrons in double quantum dots represent a promising compromise between high speed and simple fabrication for solid state implementations of single qubit and two qubits quantum logic ports. We derive the Schrieffer-Wolff effective Hamiltonian that describes in a simple and intuitive way the qubit by combining a Hubbard-like model with a projector operator method. As a result, the Hubbard-like Hamiltonian is transformed in an equivalent expression in terms of the exchange coupling interactions between pairs of electrons. The effective Hamiltonian is exploited to derive the dynamical behaviour of the system and its eigenstates on the Bloch sphere to generate qubits operation for quantum logic ports. A realistic implementation in silicon and the coupling of the qubit with a detector are discussed.
△ Less
Submitted 12 June, 2013; v1 submitted 5 April, 2013;
originally announced April 2013.
-
Charge dynamics of a single donor coupled to a few electrons quantum dot in silicon
Authors:
G. Mazzeo,
E. Prati,
M. Belli,
G. Leti,
S. Cocco,
M. Fanciulli,
F. Guagliardo,
G. Ferrari
Abstract:
We study the charge transfer dynamics between a silicon quantum dot and an individual phosphorous donor using the conduction through the quantum dot as a probe for the donor ionization state. We use a silicon n-MOSFET (metal oxide field effect transistor) biased near threshold in the SET regime with two side gates to control both the device conductance and the donor charge. Temperature and magneti…
▽ More
We study the charge transfer dynamics between a silicon quantum dot and an individual phosphorous donor using the conduction through the quantum dot as a probe for the donor ionization state. We use a silicon n-MOSFET (metal oxide field effect transistor) biased near threshold in the SET regime with two side gates to control both the device conductance and the donor charge. Temperature and magnetic field independent tunneling time is measured. We measure the statistics of the transfer of electrons observed when the ground state D0 of the donor is aligned with the SET states.
△ Less
Submitted 23 March, 2012;
originally announced March 2012.
-
Germanium electrostatic quantum dot with integrated charge detector in an MOS structure
Authors:
G. Mazzeo,
E. Yablonovitch,
H. W. Jiang
Abstract:
We report the fabrication and characterization of an electrostatic quantum dot in pure Germanium with an integrated charge measurement transistor. The device uses the Al2O3/Germanium interface for the confinement of carriers in the Germanium and an hybrid design with an electron quantum dot and hole transistor for the charge detection. The hole transistor, using with NiGe source and drain contacts…
▽ More
We report the fabrication and characterization of an electrostatic quantum dot in pure Germanium with an integrated charge measurement transistor. The device uses the Al2O3/Germanium interface for the confinement of carriers in the Germanium and an hybrid design with an electron quantum dot and hole transistor for the charge detection. The hole transistor, using with NiGe source and drain contacts, despite the modest low temperature carrier mobility of 450 cm2/Vs, has shown a sensitivity to the dot electric potential sufficient to detect single charges tunneling in and out of the quantum dot. The device is realized with a two level gate stack, with the top level used to attract electrons and the lower one to define the electron confinement potential and accumulate the hole transistor. The possibility to improve the device operation using a Al2O3/SiGe/Ge multilayer for the confinement of electrons at a smoother interface is discussed.
△ Less
Submitted 30 August, 2010;
originally announced August 2010.
-
Kuehn and Mazzeo Reply
Authors:
Reimer Kuehn,
Giorgio Mazzeo
Abstract:
We reply to a comment of Van Enter, Kuelske and Maes (cond-mat/0005176) on our letter "Critical Behavior of the Randomly Spin-Diluted 2-d Ising Model - A Grand Ensemble Approach", Phys. Rev. Lett. {\bf 73}, 2268-2271 (1994).
We reply to a comment of Van Enter, Kuelske and Maes (cond-mat/0005176) on our letter "Critical Behavior of the Randomly Spin-Diluted 2-d Ising Model - A Grand Ensemble Approach", Phys. Rev. Lett. {\bf 73}, 2268-2271 (1994).
△ Less
Submitted 10 May, 2000;
originally announced May 2000.
-
Critical behaviour of the 2d spin diluted Ising model via the equilibrium ensemble approach
Authors:
Giorgio Mazzeo,
Reimer Kuehn
Abstract:
The equilibrium ensemble approach to disordered systems is used to investigate the critical behaviour of the two dimensional Ising model in presence of quenched random site dilution. The numerical transfer matrix technique in semi- infinite strips of finite width, together with phenomenological renormalization and conformal invariance, is particularly suited to put the equilibrium ensemble appro…
▽ More
The equilibrium ensemble approach to disordered systems is used to investigate the critical behaviour of the two dimensional Ising model in presence of quenched random site dilution. The numerical transfer matrix technique in semi- infinite strips of finite width, together with phenomenological renormalization and conformal invariance, is particularly suited to put the equilibrium ensemble approach to work. A new method to extract with great precision the critical temperature of the model is proposed and applied. A more systematic finite-size scaling analysis than in previous numerical studies has been performed. A parallel investigation, along the lines of the two main scenarios currently under discussion, namely the logarithmic correction scenario (with critical exponents fixed in the Ising universality class) versus the weak universality scenario (critical exponents varying with the degree of disorder), is carried out. In interpreting our data, maximum care is costantly taken to be open in both directions. A critical discussion shows that, still, an unambiguous discrimination between the two scenarios is not possible on the basis of the available finite-size data.
△ Less
Submitted 19 July, 1999;
originally announced July 1999.
-
A Transfer Matrix study of the staggered BCSOS model
Authors:
Enrico Carlon,
Giorgio Mazzeo,
Henk van Beijeren
Abstract:
The phase diagram of the staggered six vertex, or body centered solid on solid model, is investigated by transfer matrix and finite size scaling techniques. The phase diagram contains a critical region, bounded by a Kosterlitz-Thouless line, and a second order line describing a deconstruction transition. In part of the phase diagram the deconstruction line and the Kosterlitz-Thouless line approa…
▽ More
The phase diagram of the staggered six vertex, or body centered solid on solid model, is investigated by transfer matrix and finite size scaling techniques. The phase diagram contains a critical region, bounded by a Kosterlitz-Thouless line, and a second order line describing a deconstruction transition. In part of the phase diagram the deconstruction line and the Kosterlitz-Thouless line approach each other without merging, while the deconstruction changes its critical behaviour from Ising-like to a different universality class. Our model has the same type of symmetries as some other two-dimensional models, such as the fully frustrated XY model, and may be important for understanding their phase behaviour. The thermal behaviour for weak staggering is intricate. It may be relevant for the description of surfaces of ionic crystals of CsCl structure.
△ Less
Submitted 17 October, 1996;
originally announced October 1996.