SlideShare a Scribd company logo
39th International Symposium on Reliable Distributed Systems 2020
Shanghai, China
TZ4Fabric
Executing Smart Contracts with ARM TrustZone
Christina Müller†, Marcus Brandenburger∗, Christian Cachin†,
Pascal Felber‡, Christian Göttel‡, Valerio Schiavoni‡
†University of Bern, Cryptology and Data Security
∗IBM Research Zurich
‡University of Neuchâtel, Complex Systems
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 1 / 16
Introduction
Motivating scenario
Coffee tracking system
Blockchain with smart contracts
Supply-chain tracing
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 2 / 16
Introduction
Motivating scenario
Coffee tracking system
Blockchain with smart contracts
Supply-chain tracing
Problem: hardware and software integrity can
be compromised
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 2 / 16
Introduction
Motivating scenario
Coffee tracking system
Blockchain with smart contracts
Supply-chain tracing
Problem: hardware and software integrity can
be compromised
Solution: trusted execution environments
(TEE)
hardware and software components shielding
from attacks
Based on Fabric Private Chaincode [SRDS’19]
Smart contract execution and ledger are
shielded by Intel SGX
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 2 / 16
Background
Raspberry Pi
Component Raspberry
SoC Broadcom R
VideoCore with ARM Cortex-A
Memory LPDDR
Disk microSD or HDD/SSD via USB
Ethernet Fast or Gigabit
Other Audio, BT, Camera, Display, GPIO, HDMI, WiFi
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 3 / 16
Background
ARM TrustZone
EL0
EL1 EL1
EL0
EL3 EL3
EL2
Secure Monitor
Hypervisor
OS
App
TOS
TA
EL2SPM
SMC
SMCHVCSVC
SMC
SMCHVCSVC
Normal World Secure World
A set of Arm security extensions
Hardware separation of worlds
through NS-bit
Exception level (EL)
Higher numbered EL have higher
privilege
Secure Monitor Call (SMC) to
switch worlds
Trusted execution environment (TEE)
GlobalPlatfrom (GP) TEE standard
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 4 / 16
Background
Open Portable TEE
EL0
EL1
EL2
EL3
Normal World Secure World
EL0
EL1
EL2
EL3
Secure Monitor Dispatcher
xen
Driver
OP-TEE
tee-supplicant
libteeclibc
TA
libutee
OP-TEE
OS PTA
CA
CA: client application
TA: trusted application
PTA: pseudo trusted application
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 5 / 16
Background
Hyperledger Fabric
Phase 1: Endorsement
Application sends transaction proposal to endorsing peers
Peers invoke chaincode and produce result
Peers send transaction response with endorsement back
100100010100000001
001001111010100011
101110101101110010
001001001010011110
100100010100000001
001001111010100011
101110101101110010
001001001010011110
?
?
?
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 6 / 16
Background
Hyperledger Fabric
Phase 2: Ordering
Transactions are sent to ordering service
Ordering service orders transaction responses into blocks
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 7 / 16
Background
Hyperledger Fabric
Phase 3: Validation
Orderings service broadcasts blocks to peers
Peers validate block and append it to ledger
Peers apply write set if there is no conflict
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 8 / 16
Architecture
100100010100000001
001001111010100011
101110101101110010
001001001010011110
Client Wrapper Proxy
Orderer
Wrapper: facilitate communication with the proxy via gRPC
Proxy: wrapper interface to chaincode running in normal world
Chaincode: smart contract executed in secure world with TZ
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 9 / 16
Evaluation
Setup
Nodes: 1× orderer, 1 − 8× peer, 1 − 8× proxy, 1 − 8× client
Server: dual socket Intel Xeon L5420 at 2.5 GHz and 8 GB RAM
Raspberry Pi 3B and 3B+ with PoE
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 10 / 16
Evaluation
Preliminary Evaluation
1 2 4 8
1
4
16
64
256
1024
Number of clients
Throughput[tx/s]
Read throughput
1 2 4 8
1
4
16
64
256
1024
Number of clients
Latency[ms]
Read latency
baseline QEMU QEMU baseline RaPi RaPi
Baseline RaPi achieves higher throughput than emulated RaPi with QEMU
Lower throughput of prototype than emulated RaPi
Throughput gets worse with increasing number of clients
Also higher latency with a single client
Possible bottleneck?
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 11 / 16
Evaluation
Latency Breakdown
create	gRPC	stream
chaincode_wrapper chaincode_proxy
chaincode
client
invoke
TEEC_OpenSession
GetStateResponse(ii)
GetStateRequest(ii)
InvocationResponse(iv)
return
{A}
TEEC_CloseSession
TEEC_InvokeCommand(i)
return(i)
TEEC_InvokeCommand(iii)
return(iii)
{D}
{J}
{M}
{G}
InvocationRequest(iv)
{O}
{N}
{B}
{C}
{I}
{E}
{H}
{K}
{L}
{F}
Time each segment individually
Segment B contributes 65 − 75% of
the total time
Load chaincode as TA
Before invocation
TEEC_OpenSession
All other segments contribute up to
1%
Problem identification:
Reuse TEE context and TA session
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 12 / 16
Evaluation
Throughput
0 200 400
0
1
2
Throughput [tx/s]
Latency[s]
a) Read latency
1 2 4 8 16 32 64 128
0
200
400
Number of clients
Throughput[tx/s]
b) Transactions
0 200 400
0
200
400
600
Throughput [tx/s]
Energy[J/tx]
c) Energy
0 200 400
0
1
2
Throughput [tx/s]
Latency[s]
d) Write latency
1 2 4 8 16 32 64 128
0
200
400
Number of clients
Throughput[tx/s]
e) Transactions
0 200 400
0
200
400
600
Throughput [tx/s]
Energy[J/tx]
f) Energy
baseline QEMU QEMU baseline RaPi RaPi
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 13 / 16
Evaluation
Energy
0 200 400
26
28
30
Throughput [tx/s]
Ordererenergy[kJ]
a) Orderer reads
0 200 400
26
27
28
29
Throughput [tx/s]
Avgpeerenergy[kJ]
b) Peer reads
0 200 400
0
10
20
30
Throughput [tx/s]
Avgproxyenergy[kJ]
c) Proxy reads
0 200 400
26
27
28
29
Throughput [tx/s]
Ordererenergy[kJ]
d) Orderer writes
0 200 400
26
27
28
Throughput [tx/s]
Avgpeerenergy[kJ]
e) Peer writes
0 200 400
0
10
20
30
Throughput [tx/s]
Avgproxyenergy[kJ]
f) Proxy writes
baseline QEMU QEMU baseline RaPi RaPi
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 14 / 16
Conclusion & Future Work
Conclusion:
Deployment of chaincodes on TZ-enabled devices in Hyperledger Fabric
Shielding chaincode execution with TZ
TZ4Fabric prototype running on Raspberry Pi 3B and 3B+
Performance and energy trade-offs
Future:
Consolidation of proxy and peer
How will performance and energy be impacted?
Reuse TEE context and TA session in prototype
Simplify the installation of chaincodes with TZ in TZ4Fabric
Attempt to shield the ledger
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 15 / 16
Thank you
Thank you for your attention!
The research leading to these results has received funding from the European
Union’s Horizon 2020 research and innovation programme under the LEGaTO
Project (legato-project.eu), grant agreement No 780681.
SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch
TZ4Fabric: Executing Smart Contracts with ARM TrustZone 16 / 16

More Related Content

What's hot

Enabling Power-Efficient AI Through Quantization
Enabling Power-Efficient AI Through QuantizationEnabling Power-Efficient AI Through Quantization
Enabling Power-Efficient AI Through Quantization
Qualcomm Research
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGAnitin3940
 
Virtualized high performance computing with mellanox fdr and ro ce
Virtualized high performance computing with mellanox fdr and ro ceVirtualized high performance computing with mellanox fdr and ro ce
Virtualized high performance computing with mellanox fdr and ro ce
inside-BigData.com
 
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro edPantech ProEd Pvt Ltd
 
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
Sungjin Kang
 
Vlsi ieee 2014 project titles
Vlsi ieee 2014 project titlesVlsi ieee 2014 project titles
Vlsi ieee 2014 project titles
Nxtlogic Software Solutions
 
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
Edge AI and Vision Alliance
 
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ..."Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
Edge AI and Vision Alliance
 
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
Manoj Subramanian
 
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Editor IJARCET
 
New Media Services from a Mobile Chipset Vendor and Standardization Perspective
New Media Services from a Mobile Chipset Vendor and Standardization PerspectiveNew Media Services from a Mobile Chipset Vendor and Standardization Perspective
New Media Services from a Mobile Chipset Vendor and Standardization Perspective
Förderverein Technische Fakultät
 
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
Edge AI and Vision Alliance
 
P138 142 r4c03
P138 142 r4c03P138 142 r4c03
P138 142 r4c03
Kuan-Tsae Huang
 
CEM Workshop Lectures (9/11): Modelling Electromagnetics Field
CEM Workshop Lectures (9/11):  Modelling Electromagnetics FieldCEM Workshop Lectures (9/11):  Modelling Electromagnetics Field
CEM Workshop Lectures (9/11): Modelling Electromagnetics Field
Abhishek Jain
 

What's hot (14)

Enabling Power-Efficient AI Through Quantization
Enabling Power-Efficient AI Through QuantizationEnabling Power-Efficient AI Through Quantization
Enabling Power-Efficient AI Through Quantization
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
 
Virtualized high performance computing with mellanox fdr and ro ce
Virtualized high performance computing with mellanox fdr and ro ceVirtualized high performance computing with mellanox fdr and ro ce
Virtualized high performance computing with mellanox fdr and ro ce
 
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
 
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
 
Vlsi ieee 2014 project titles
Vlsi ieee 2014 project titlesVlsi ieee 2014 project titles
Vlsi ieee 2014 project titles
 
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
“Streamlining Development of Edge AI Applications,” a Presentation from NVIDIA
 
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ..."Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
 
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
 
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903
 
New Media Services from a Mobile Chipset Vendor and Standardization Perspective
New Media Services from a Mobile Chipset Vendor and Standardization PerspectiveNew Media Services from a Mobile Chipset Vendor and Standardization Perspective
New Media Services from a Mobile Chipset Vendor and Standardization Perspective
 
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
 
P138 142 r4c03
P138 142 r4c03P138 142 r4c03
P138 142 r4c03
 
CEM Workshop Lectures (9/11): Modelling Electromagnetics Field
CEM Workshop Lectures (9/11):  Modelling Electromagnetics FieldCEM Workshop Lectures (9/11):  Modelling Electromagnetics Field
CEM Workshop Lectures (9/11): Modelling Electromagnetics Field
 

Similar to TZ4Fabric: Executing Smart Contracts with ARM TrustZone

Optical and mobile networks: friends or foes?
Optical and mobile networks: friends or foes?Optical and mobile networks: friends or foes?
Optical and mobile networks: friends or foes?
ADVA
 
Bayisa Taye.pptx
Bayisa Taye.pptxBayisa Taye.pptx
Bayisa Taye.pptx
Abir Hossain
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
 
2019 adi bitfury_sysman_215
2019 adi bitfury_sysman_2152019 adi bitfury_sysman_215
2019 adi bitfury_sysman_215
Alex Petrov
 
7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf7. Ford_Dunton_TSN_CRM.pdf
03_PCIe_3.0_PHY_Electrical_Layer_Requirements_Final[1].pdf
03_PCIe_3.0_PHY_Electrical_Layer_Requirements_Final[1].pdf03_PCIe_3.0_PHY_Electrical_Layer_Requirements_Final[1].pdf
03_PCIe_3.0_PHY_Electrical_Layer_Requirements_Final[1].pdf
DanishKhan313548
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
MohammadSwerki2
 
Report on TCP vulnerabilities
Report on TCP vulnerabilitiesReport on TCP vulnerabilities
Report on TCP vulnerabilities
Prakhar Bansal
 
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Infrastructure Facility
 
Edge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-timeEdge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-time
Shuquan Huang
 
NGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentationNGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentation
VEDLIoT Project
 
Evaluation of authentication based elliptic curve cryptography in wireless se...
Evaluation of authentication based elliptic curve cryptography in wireless se...Evaluation of authentication based elliptic curve cryptography in wireless se...
Evaluation of authentication based elliptic curve cryptography in wireless se...
Balkis Bettoumi
 
Richard - 6G Symposium.pdf
Richard - 6G Symposium.pdfRichard - 6G Symposium.pdf
Richard - 6G Symposium.pdf
Richard Renwei Li
 
Richard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdfRichard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdf
Richard Renwei Li
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET Journal
 
Io t sagemcom - eucnc - 29062015 - v(0.3)-light
Io t   sagemcom - eucnc - 29062015 - v(0.3)-lightIo t   sagemcom - eucnc - 29062015 - v(0.3)-light
Io t sagemcom - eucnc - 29062015 - v(0.3)-light
Thierry Lestable
 
DAIS19: Developing Secure Services for IoT with OP-TEE: A First Look at Perfo...
DAIS19: Developing Secure Services for IoT with OP-TEE: A First Look at Perfo...DAIS19: Developing Secure Services for IoT with OP-TEE: A First Look at Perfo...
DAIS19: Developing Secure Services for IoT with OP-TEE: A First Look at Perfo...
LEGATO project
 
Varieties of Blockchains
Varieties of BlockchainsVarieties of Blockchains
Varieties of Blockchains
Sadegh Dorri N.
 
LOW POWER AND HIGH SPEED DIVERSE DIGITAL CIRCUIT FOR SUB-THRESHOLD LEVEL
LOW POWER AND HIGH SPEED DIVERSE DIGITAL CIRCUIT FOR SUB-THRESHOLD LEVELLOW POWER AND HIGH SPEED DIVERSE DIGITAL CIRCUIT FOR SUB-THRESHOLD LEVEL
LOW POWER AND HIGH SPEED DIVERSE DIGITAL CIRCUIT FOR SUB-THRESHOLD LEVEL
VIT-AP University
 
USN Services
USN Services USN Services
USN Services
Andreas Schaller
 

Similar to TZ4Fabric: Executing Smart Contracts with ARM TrustZone (20)

Optical and mobile networks: friends or foes?
Optical and mobile networks: friends or foes?Optical and mobile networks: friends or foes?
Optical and mobile networks: friends or foes?
 
Bayisa Taye.pptx
Bayisa Taye.pptxBayisa Taye.pptx
Bayisa Taye.pptx
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
2019 adi bitfury_sysman_215
2019 adi bitfury_sysman_2152019 adi bitfury_sysman_215
2019 adi bitfury_sysman_215
 
7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf
 
03_PCIe_3.0_PHY_Electrical_Layer_Requirements_Final[1].pdf
03_PCIe_3.0_PHY_Electrical_Layer_Requirements_Final[1].pdf03_PCIe_3.0_PHY_Electrical_Layer_Requirements_Final[1].pdf
03_PCIe_3.0_PHY_Electrical_Layer_Requirements_Final[1].pdf
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
 
Report on TCP vulnerabilities
Report on TCP vulnerabilitiesReport on TCP vulnerabilities
Report on TCP vulnerabilities
 
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
 
Edge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-timeEdge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-time
 
NGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentationNGIoT standardisation workshops_Jens Hagemeyer presentation
NGIoT standardisation workshops_Jens Hagemeyer presentation
 
Evaluation of authentication based elliptic curve cryptography in wireless se...
Evaluation of authentication based elliptic curve cryptography in wireless se...Evaluation of authentication based elliptic curve cryptography in wireless se...
Evaluation of authentication based elliptic curve cryptography in wireless se...
 
Richard - 6G Symposium.pdf
Richard - 6G Symposium.pdfRichard - 6G Symposium.pdf
Richard - 6G Symposium.pdf
 
Richard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdfRichard - MedComNet Panel - Final Version.pdf
Richard - MedComNet Panel - Final Version.pdf
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
 
Io t sagemcom - eucnc - 29062015 - v(0.3)-light
Io t   sagemcom - eucnc - 29062015 - v(0.3)-lightIo t   sagemcom - eucnc - 29062015 - v(0.3)-light
Io t sagemcom - eucnc - 29062015 - v(0.3)-light
 
DAIS19: Developing Secure Services for IoT with OP-TEE: A First Look at Perfo...
DAIS19: Developing Secure Services for IoT with OP-TEE: A First Look at Perfo...DAIS19: Developing Secure Services for IoT with OP-TEE: A First Look at Perfo...
DAIS19: Developing Secure Services for IoT with OP-TEE: A First Look at Perfo...
 
Varieties of Blockchains
Varieties of BlockchainsVarieties of Blockchains
Varieties of Blockchains
 
LOW POWER AND HIGH SPEED DIVERSE DIGITAL CIRCUIT FOR SUB-THRESHOLD LEVEL
LOW POWER AND HIGH SPEED DIVERSE DIGITAL CIRCUIT FOR SUB-THRESHOLD LEVELLOW POWER AND HIGH SPEED DIVERSE DIGITAL CIRCUIT FOR SUB-THRESHOLD LEVEL
LOW POWER AND HIGH SPEED DIVERSE DIGITAL CIRCUIT FOR SUB-THRESHOLD LEVEL
 
USN Services
USN Services USN Services
USN Services
 

More from LEGATO project

A practical approach for updating an integrity-enforced operating system
A practical approach for updating an integrity-enforced operating systemA practical approach for updating an integrity-enforced operating system
A practical approach for updating an integrity-enforced operating system
LEGATO project
 
TEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsTEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEs
LEGATO project
 
secureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworksecureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow Framework
LEGATO project
 
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
LEGATO project
 
LEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use CaseLEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use Case
LEGATO project
 
Smart Home AI at the edge
Smart Home AI at the edgeSmart Home AI at the edge
Smart Home AI at the edge
LEGATO project
 
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGATO project
 
LEGaTO Integration
LEGaTO IntegrationLEGaTO Integration
LEGaTO Integration
LEGATO project
 
LEGaTO: Use cases
LEGaTO: Use casesLEGaTO: Use cases
LEGaTO: Use cases
LEGATO project
 
LEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming ModelsLEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming Models
LEGATO project
 
LEGaTO: Software Stack Runtimes
LEGaTO: Software Stack RuntimesLEGaTO: Software Stack Runtimes
LEGaTO: Software Stack Runtimes
LEGATO project
 
LEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous HardwareLEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous Hardware
LEGATO project
 
LEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing WorkshopLEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGATO project
 
Infection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow ComputingInfection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow Computing
LEGATO project
 
Smart Home - AI at the edge
Smart Home - AI at the edgeSmart Home - AI at the edge
Smart Home - AI at the edge
LEGATO project
 
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-ResiliencyFPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
LEGATO project
 
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
LEGATO project
 
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric EnvironmentsScheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
LEGATO project
 
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient ComputingRECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
LEGATO project
 
Secure Task-Based Programming with OmpSs and SGX
Secure Task-Based Programming with OmpSs and SGXSecure Task-Based Programming with OmpSs and SGX
Secure Task-Based Programming with OmpSs and SGX
LEGATO project
 

More from LEGATO project (20)

A practical approach for updating an integrity-enforced operating system
A practical approach for updating an integrity-enforced operating systemA practical approach for updating an integrity-enforced operating system
A practical approach for updating an integrity-enforced operating system
 
TEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsTEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEs
 
secureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworksecureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow Framework
 
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
 
LEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use CaseLEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use Case
 
Smart Home AI at the edge
Smart Home AI at the edgeSmart Home AI at the edge
Smart Home AI at the edge
 
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
 
LEGaTO Integration
LEGaTO IntegrationLEGaTO Integration
LEGaTO Integration
 
LEGaTO: Use cases
LEGaTO: Use casesLEGaTO: Use cases
LEGaTO: Use cases
 
LEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming ModelsLEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming Models
 
LEGaTO: Software Stack Runtimes
LEGaTO: Software Stack RuntimesLEGaTO: Software Stack Runtimes
LEGaTO: Software Stack Runtimes
 
LEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous HardwareLEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous Hardware
 
LEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing WorkshopLEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing Workshop
 
Infection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow ComputingInfection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow Computing
 
Smart Home - AI at the edge
Smart Home - AI at the edgeSmart Home - AI at the edge
Smart Home - AI at the edge
 
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-ResiliencyFPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
 
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
 
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric EnvironmentsScheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
 
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient ComputingRECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
 
Secure Task-Based Programming with OmpSs and SGX
Secure Task-Based Programming with OmpSs and SGXSecure Task-Based Programming with OmpSs and SGX
Secure Task-Based Programming with OmpSs and SGX
 

Recently uploaded

general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
Sérgio Sacani
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
muralinath2
 
Anemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditionsAnemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditions
muralinath2
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
YOGESH DOGRA
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
aishnasrivastava
 
insect morphology and physiology of insect
insect morphology and physiology of insectinsect morphology and physiology of insect
insect morphology and physiology of insect
anitaento25
 
Viksit bharat till 2047 India@2047.pptx
Viksit bharat till 2047  India@2047.pptxViksit bharat till 2047  India@2047.pptx
Viksit bharat till 2047 India@2047.pptx
rakeshsharma20142015
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
Penicillin...........................pptx
Penicillin...........................pptxPenicillin...........................pptx
Penicillin...........................pptx
Cherry
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
AADYARAJPANDEY1
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
Areesha Ahmad
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
Scintica Instrumentation
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
ossaicprecious19
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
kumarmathi863
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 

Recently uploaded (20)

general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
 
Anemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditionsAnemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditions
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
 
insect morphology and physiology of insect
insect morphology and physiology of insectinsect morphology and physiology of insect
insect morphology and physiology of insect
 
Viksit bharat till 2047 India@2047.pptx
Viksit bharat till 2047  India@2047.pptxViksit bharat till 2047  India@2047.pptx
Viksit bharat till 2047 India@2047.pptx
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
Penicillin...........................pptx
Penicillin...........................pptxPenicillin...........................pptx
Penicillin...........................pptx
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 

TZ4Fabric: Executing Smart Contracts with ARM TrustZone

  • 1. 39th International Symposium on Reliable Distributed Systems 2020 Shanghai, China TZ4Fabric Executing Smart Contracts with ARM TrustZone Christina Müller†, Marcus Brandenburger∗, Christian Cachin†, Pascal Felber‡, Christian Göttel‡, Valerio Schiavoni‡ †University of Bern, Cryptology and Data Security ∗IBM Research Zurich ‡University of Neuchâtel, Complex Systems SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 1 / 16
  • 2. Introduction Motivating scenario Coffee tracking system Blockchain with smart contracts Supply-chain tracing SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 2 / 16
  • 3. Introduction Motivating scenario Coffee tracking system Blockchain with smart contracts Supply-chain tracing Problem: hardware and software integrity can be compromised SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 2 / 16
  • 4. Introduction Motivating scenario Coffee tracking system Blockchain with smart contracts Supply-chain tracing Problem: hardware and software integrity can be compromised Solution: trusted execution environments (TEE) hardware and software components shielding from attacks Based on Fabric Private Chaincode [SRDS’19] Smart contract execution and ledger are shielded by Intel SGX SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 2 / 16
  • 5. Background Raspberry Pi Component Raspberry SoC Broadcom R VideoCore with ARM Cortex-A Memory LPDDR Disk microSD or HDD/SSD via USB Ethernet Fast or Gigabit Other Audio, BT, Camera, Display, GPIO, HDMI, WiFi SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 3 / 16
  • 6. Background ARM TrustZone EL0 EL1 EL1 EL0 EL3 EL3 EL2 Secure Monitor Hypervisor OS App TOS TA EL2SPM SMC SMCHVCSVC SMC SMCHVCSVC Normal World Secure World A set of Arm security extensions Hardware separation of worlds through NS-bit Exception level (EL) Higher numbered EL have higher privilege Secure Monitor Call (SMC) to switch worlds Trusted execution environment (TEE) GlobalPlatfrom (GP) TEE standard SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 4 / 16
  • 7. Background Open Portable TEE EL0 EL1 EL2 EL3 Normal World Secure World EL0 EL1 EL2 EL3 Secure Monitor Dispatcher xen Driver OP-TEE tee-supplicant libteeclibc TA libutee OP-TEE OS PTA CA CA: client application TA: trusted application PTA: pseudo trusted application SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 5 / 16
  • 8. Background Hyperledger Fabric Phase 1: Endorsement Application sends transaction proposal to endorsing peers Peers invoke chaincode and produce result Peers send transaction response with endorsement back 100100010100000001 001001111010100011 101110101101110010 001001001010011110 100100010100000001 001001111010100011 101110101101110010 001001001010011110 ? ? ? SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 6 / 16
  • 9. Background Hyperledger Fabric Phase 2: Ordering Transactions are sent to ordering service Ordering service orders transaction responses into blocks SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 7 / 16
  • 10. Background Hyperledger Fabric Phase 3: Validation Orderings service broadcasts blocks to peers Peers validate block and append it to ledger Peers apply write set if there is no conflict SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 8 / 16
  • 11. Architecture 100100010100000001 001001111010100011 101110101101110010 001001001010011110 Client Wrapper Proxy Orderer Wrapper: facilitate communication with the proxy via gRPC Proxy: wrapper interface to chaincode running in normal world Chaincode: smart contract executed in secure world with TZ SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 9 / 16
  • 12. Evaluation Setup Nodes: 1× orderer, 1 − 8× peer, 1 − 8× proxy, 1 − 8× client Server: dual socket Intel Xeon L5420 at 2.5 GHz and 8 GB RAM Raspberry Pi 3B and 3B+ with PoE SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 10 / 16
  • 13. Evaluation Preliminary Evaluation 1 2 4 8 1 4 16 64 256 1024 Number of clients Throughput[tx/s] Read throughput 1 2 4 8 1 4 16 64 256 1024 Number of clients Latency[ms] Read latency baseline QEMU QEMU baseline RaPi RaPi Baseline RaPi achieves higher throughput than emulated RaPi with QEMU Lower throughput of prototype than emulated RaPi Throughput gets worse with increasing number of clients Also higher latency with a single client Possible bottleneck? SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 11 / 16
  • 14. Evaluation Latency Breakdown create gRPC stream chaincode_wrapper chaincode_proxy chaincode client invoke TEEC_OpenSession GetStateResponse(ii) GetStateRequest(ii) InvocationResponse(iv) return {A} TEEC_CloseSession TEEC_InvokeCommand(i) return(i) TEEC_InvokeCommand(iii) return(iii) {D} {J} {M} {G} InvocationRequest(iv) {O} {N} {B} {C} {I} {E} {H} {K} {L} {F} Time each segment individually Segment B contributes 65 − 75% of the total time Load chaincode as TA Before invocation TEEC_OpenSession All other segments contribute up to 1% Problem identification: Reuse TEE context and TA session SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 12 / 16
  • 15. Evaluation Throughput 0 200 400 0 1 2 Throughput [tx/s] Latency[s] a) Read latency 1 2 4 8 16 32 64 128 0 200 400 Number of clients Throughput[tx/s] b) Transactions 0 200 400 0 200 400 600 Throughput [tx/s] Energy[J/tx] c) Energy 0 200 400 0 1 2 Throughput [tx/s] Latency[s] d) Write latency 1 2 4 8 16 32 64 128 0 200 400 Number of clients Throughput[tx/s] e) Transactions 0 200 400 0 200 400 600 Throughput [tx/s] Energy[J/tx] f) Energy baseline QEMU QEMU baseline RaPi RaPi SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 13 / 16
  • 16. Evaluation Energy 0 200 400 26 28 30 Throughput [tx/s] Ordererenergy[kJ] a) Orderer reads 0 200 400 26 27 28 29 Throughput [tx/s] Avgpeerenergy[kJ] b) Peer reads 0 200 400 0 10 20 30 Throughput [tx/s] Avgproxyenergy[kJ] c) Proxy reads 0 200 400 26 27 28 29 Throughput [tx/s] Ordererenergy[kJ] d) Orderer writes 0 200 400 26 27 28 Throughput [tx/s] Avgpeerenergy[kJ] e) Peer writes 0 200 400 0 10 20 30 Throughput [tx/s] Avgproxyenergy[kJ] f) Proxy writes baseline QEMU QEMU baseline RaPi RaPi SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 14 / 16
  • 17. Conclusion & Future Work Conclusion: Deployment of chaincodes on TZ-enabled devices in Hyperledger Fabric Shielding chaincode execution with TZ TZ4Fabric prototype running on Raspberry Pi 3B and 3B+ Performance and energy trade-offs Future: Consolidation of proxy and peer How will performance and energy be impacted? Reuse TEE context and TA session in prototype Simplify the installation of chaincodes with TZ in TZ4Fabric Attempt to shield the ledger SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 15 / 16
  • 18. Thank you Thank you for your attention! The research leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under the LEGaTO Project (legato-project.eu), grant agreement No 780681. SRDS’20 22.09.2020 | CRYPTO, IBM & IIUN | Christian Göttel | christian.goettel@unine.ch TZ4Fabric: Executing Smart Contracts with ARM TrustZone 16 / 16