A new technical paper titled “KeyVisor — A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies” was published by researchers at CISPA Helmholtz Center for Information Security and Ruhr University Bochum.
Abstract
“The confidentiality of cryptographic keys is essential for the security of protection schemes used for communication, file encryption, and outsourced computation. Beyond cryptanalytic attacks, adversaries can steal keys from memory via software exploits or side channels, enabling them to, e.g., tamper with secrets or impersonate key owners. Therefore, existing defenses protect keys in dedicated devices or isolated memory, or store them only in encrypted form. However, these designs often provide unfavorable tradeoffs, sacrificing performance, fine-grained access control, or deployability.
In this paper, we present KeyVisor, a lightweight ISA extension that securely offloads the handling of cryptographic keys to the CPU. KeyVisor provides CPU instructions that enable applications to request protected key handles and perform AEAD cipher operations on them. The underlying keys are accessible only by KeyVisor, and thus never leak to memory. KeyVisor’s direct CPU integration enables fast crypto operations and hardware-enforced key usage restrictions, e.g., keys usable only for de-/encryption, with a limited lifetime, or with a process binding. Furthermore, privileged software, e.g., the monitor firmware of TEEs, can revoke keys or bind them to a specific process/TEE. We implement KeyVisor for RISC-V based on Rocket Chip, evaluate its performance, and demonstrate real-world use cases, including key-value databases, automotive feature licensing, and a read-only network middlebox.”
Find the technical paper here. October 2024.
Schwarz, Fabian, Jan Philipp Thoma, Christian Rossow, and Tim Güneysu. “KeyVisor–A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies.” arXiv preprint arXiv:2410.01777 (2024).
Leave a Reply