暂无分享,去创建一个
T hi s is a po st -p ee rre vi ew ,p re -c op ye di t ve rs io n of an ar ti cl e pu bl is he d in “N et w or ke d Sy st em s” .T he fin al au th en ti ca te d ve rs io n is av ai la bl e on lin e at ht tp s: // do i.o rg /1 0. 10 07 /9 78 -3 -0 30 -0 55 29 -5 _ 24 . The latest generation of Intel processors supports Software Guard Extensions (SGX), a set of instructions that implements a Trusted Execution Environment (TEE) right inside the CPU, by means of socalled enclaves. This paper presents Stress-SGX, an easy-to-use stresstest tool to evaluate the performance of SGX-enabled nodes. We build on top of the popular Stress-ng tool, while only keeping the workload injectors (stressors) that are meaningful in the SGX context. We report on several insights and lessons learned about porting legacy code to run inside an SGX enclave, as well as the limitations introduced by this process. Finally, we use Stress-SGX to conduct a study comparing the performance of different SGX-enabled machines.
[1] Ricardo Bianchini,et al. Resource Central: Understanding and Predicting Workloads for Improved Resource Management in Large Cloud Platforms , 2017, SOSP.
[2] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[3] Mark Silberstein,et al. Eleos: ExitLess OS Services for SGX Enclaves , 2017, EuroSys.
[4] Romain Rouvoy,et al. PowerAPI: A Software Library to Monitor the Energy Consumed at the Process-Level , 2013, ERCIM News.