Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can We Enable the Security Monitor On-Chip Memory Plugin in Keystone's QEMU Platform? #454

Open
AlfiRam opened this issue Jul 5, 2024 · 1 comment

Comments

@AlfiRam
Copy link

AlfiRam commented Jul 5, 2024

Is it possible to implement or emulate the Security Monitor on-chip memory plugin in the Keystone QEMU platform?

I'm interested in using this feature alongside the runtime's enclave paging plugin for security testing against hardware attacks.

My current understanding is that in the paper, the on-chip memory plugin is implemented for FU540-C000 hardware, while QEMU is an emulator, not actual hardware. Given this context, I have a few questions:

  1. Is enabling the SM on-chip memory plugin in QEMU possible?
  2. If yes, what would be the best approach to implement this?
  3. If not, are there alternative ways to achieve similar functionality for testing purposes?
@grg-haas
Copy link
Collaborator

grg-haas commented Jul 5, 2024

Hi @AlfiRam ! I imagine this could be possible by modifying QEMU and the SM somewhat, yes! In QEMU you'd probably want to add a custom memory range, corresponding to the physical address range for the on-chip memory. Then you'd need to somehow load the SM into this memory range rather than the standard DRAM range. I'm not too familiar with QEMU's internal APIs in that regard, but it totally should be possible!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants