Project/Area Number |
21K17726
|
Research Category |
Grant-in-Aid for Early-Career Scientists
|
Allocation Type | Multi-year Fund |
Review Section |
Basic Section 60050:Software-related
|
Research Institution | Internet Initiative Japan Inc. (Research Laboratory) |
Principal Investigator |
オブラン ピエールルイ 株式会社インターネットイニシアティブ(技術研究所), 技術研究所 技術研究室, 研究員 (00888886)
|
Project Period (FY) |
2021-04-01 – 2026-03-31
|
Project Status |
Granted (Fiscal Year 2023)
|
Budget Amount *help |
¥2,600,000 (Direct Cost: ¥2,000,000、Indirect Cost: ¥600,000)
Fiscal Year 2025: ¥390,000 (Direct Cost: ¥300,000、Indirect Cost: ¥90,000)
Fiscal Year 2024: ¥390,000 (Direct Cost: ¥300,000、Indirect Cost: ¥90,000)
Fiscal Year 2023: ¥390,000 (Direct Cost: ¥300,000、Indirect Cost: ¥90,000)
Fiscal Year 2022: ¥650,000 (Direct Cost: ¥500,000、Indirect Cost: ¥150,000)
Fiscal Year 2021: ¥780,000 (Direct Cost: ¥600,000、Indirect Cost: ¥180,000)
|
Keywords | Trusted Execution / ARM TrustZone / Intel SGX / RISC-V Keystone / Online video games / TEE / Cheating |
Outline of Research at the Start |
Even though video games have strong performance requirements, protecting online video games by leveraging TEEs is not a trivial task due to the inherent limitations of TEEs: (i) memory size limitation; (2) no direct access to I/O operations; and (3) non-negligible performance overhead to ensure security properties of the TEE. The challenges of this research project are thus three-fold: 1) how to design an effective method to partition the game code into a secure and unsecure part, to keep the memory footprint small; 2) how to provide trusted I/O; and 3) how to ensure acceptable performance.
|
Outline of Annual Research Achievements |
- Several rounds of submission to Usenix S&P and CCS, but no accept so far. - Paper accepted at the SysTEX '23 workshop. - Research paper submitted to the SysTEX '24 workshop, but unfortunately not accepted. - Started working on securing I/O by leveraging the ARM TrustZone TEE so that a cheater cannot automate his gameplay (e.g., running an aimbot).
|
Current Status of Research Progress |
Current Status of Research Progress
3: Progress in research has been slightly delayed.
Reason
Current results have not been accepted yet to a top-level international conference, so we have to spend more time to strengthen the paper.
In parallel we are continuing working on the other tasks related to the project: small secure memory and absence of trusted I/O.
|
Strategy for Future Research Activity |
Small secure memory: we are actively working on the implementation and evaluation of our solution. We are currently using Qemu, but plan to eventually evaluate our solution on a real RISC-V board.
Trusted I/O: we are working on the implementation of a new system where I/O is protected against a strong attacker, so that a cheater cannot automate his cheats (e.g., running an aimbot). Results with the current prototype, leveraging ARM TrustZone, look promising.
|