Intel SGX has several disadvantages:
- High transition costs (ECalls are in 50 times slow compared to system calls)
- Limited EPC (~92MiB are available without a paging)
- Bare-metal style of programming (No dependencies)
Actors in EActors:
- Use ECall-free messages
- Lightweight (good for the EPC size)
- Very flexible (can be trusted or untrusted)
Compared to other monolithic frameworks (SCONE, Haven, Graphene-SGX, Panoply, etc) EActors offers a multi-enclave, 'distributed' design, where each enclave includes the only minimal set of actors, thereby, has the minimal attack surface.
The original paper is avaliable here
@inproceedings{sartakov18eactors,
author = {Sartakov, Vasily A. and Stefan Brenner and Sonia Ben Mokhtar and Sara Bouchenak and Ga{\"e}l Thomas and R{\"u}diger Kapitza},
title = {\textit{E}{A}ctors: {F}ast and flexible trusted computing using {SGX}},
year = {2018},
publisher = {ACM},
booktitle = {19th International Middleware Conference Proceedings (Middleware'18)},
}
TBD
- Intel SGX SDK should be installed (tested with v1.9)
- SGX_SDK ?= /path/to/the/sgxsdk should be updated in parts/App/Makefile and parts/Enclave/Makefile or you can use SGX_SDK=/path/to/the/intel/sgxsdk ./run.sh inside the target directory
Build.py generates the source tree from actor's sources and a configuration file (XML), which describes the deployment of actors.
- tools/build.py file xml port sys:
- file: Actor source file
- xml: Confguration file
- port: TCP/IP port (deprecated)
- sys: source file with system actors
Example:
tools/build.py examples/template/template.c examples/template/template-1.xml 0 parts/App/systhreads_factory.cxx
The framework also generates Makefiles and run.sh inside the target folder. You should use this script since it generates MEASUREMENTs, which are necessary for LARSA.
- Nodes: memory chunks with a header and a payload. Nodes are allocated by the framework.
- Queues: double-linked lists on top of the Hardware-Lock Elision
- API: (Push/pop)-(back/front)
- MBOXes: API-based FIFOs for messaging
- POOLs: API-based LIFOs for empty messages
- Connectors: High-level communication interfaces which hide the implementation of difference between cross/within encrypted/non-encrypted communications. For enclaved actors only (fixable)
- Cargos: compound objects produced by connectors. Used in 1-1 messaging.
The framework supports three encryption scheme for messages (GCM, CTR and MEMCPY) and two key-exchange procedures (SEAL and LARSA).
Full-fledged AES Galois/Counter Mode. Both sides increment IV on each package.
AES Counter Mode. Counters are random but fixed. Used as deterministic encryption in the deprecated POS. Can be used in messaging on your own security risks. Approximately 30% faster compared to GCM.
For testing purposes only. memcpy instead of encryption
Both sides use SEALing for data exchange. Should be considered as vulnerable scheme, because an intruder can unseal all messages (and get an access to all encryption keys) is they gets full access to an enclave.
Local Attestation with RSA. Combines two procedures: Local attestation is used to attest the slave enclave and send RSA key. Then this key is used to transfer encryption context for the future encryption of the traffic (GCM for example). The most secure approach.
The framework uses system actors for networking. systhreads_factory.cxx contains the FACTORY actor which spawns network actors via requests. Network actors use mboxes for communications and can transparently stitch mboxes over a network.
The POS is deprecated and will be redeveloped.
-
Hellow World (examples/template)
- Simple hello-world actor
-
FIFO test (examples/fifo_test)
- Developments purpose only
-
ping-pong (examples/pingpong)
- Uses a low-level mbox-based non-encrypted messages
- Supports trusted and untrusted actors
-
ping-pong2 (examples/pingpong2)
- Uses cargo-based communications
- Can use private or public cargos
- Can encrypt or not encrypt messages
- Can use only trusted actors
- Supports SEAL and LARSA, various encryption schemes
-
ping-pongLA (examples/pingpongLA)
- Shows how mboxes can be used for the local attestation
-
ping-pongDH (examples/pingpongDH)
- Diffie-Hellman key exchange procedure on top of mboxes
-
ping-pongN (examples/pingpongN)
- Uses non-encrypted cargos over a network.
-
tripong (triping.c)
- Same as ping-pong2, but involves 3 chained actors.
- Uses LARSA
-
Secure Multi-party Computation (smc)
- Computed by multiple nodes the secure sum
- Encrypted cargo-based messages between parties
- Static and dynamic protocols
- Different vector lengths, number of parties
- Uses LARSA
$doxygen doxyfile