什么情况下需要割包皮| 水灵是什么意思| 五福是什么生肖| 镜子碎了有什么征兆吗| 弯弯是什么意思| 疖肿吃什么药| 学名是什么意思| 什么人不适合吃榴莲| 真菌涂片检查是查什么| 心肌酶高有什么症状| 小麦是什么| 伴侣是什么| 胎膜早破是什么原因引起的| 女人喝咖啡有什么好处| 肺结节吃什么药最好| 睡眠时间短是什么原因| 皮肤湿疹用什么药膏| 脂肪肝中医叫什么名字| 排卵日是什么意思| 高反人群一般是什么人| 中焦不通用什么中成药| 国籍填什么| 胸胀痛什么原因| 肾钙化灶是什么意思| 霸王花是什么花| 梦见蛇挡路是什么意思| 定制和订制有什么区别| 紫苏有什么功效与作用| 外科医生是做什么的| 宫颈那囊是什么| 穿刺是检查什么的| 下身瘙痒用什么药| 什么是粉刺| dna里面有什么| 胃经当令是什么时辰| 六月初一有什么讲究| 九月二十是什么星座| 谢邀什么意思| lsp什么意思| 转氨酶异常是什么意思| 豹子是什么牌子| 胃窦是什么| 舌炎是什么症状| 什么叫疝气| 人到中年为什么会发胖| 过敏是什么原因引起的| ct查什么| 小蝌蚪吃什么| 喘息是什么意思| 梦到小鸟是什么意思| mrsa是什么细菌| 妯娌关系是什么意思| 阿卡波糖什么时候吃| 什么是复韵母| 男人射精是什么感觉| 清明有什么习俗| ab是什么| 甲状旁腺是什么意思| 为什么说金克木生财| 六一送女孩子什么礼物| 晚上睡不着觉是什么原因| 儿童鼻炎挂什么科| 脑梗吃什么中药| 眩晕症吃什么药| 厘清和理清的区别是什么| baumwolle是什么面料| 湿疹吃什么药| 血肌酐是什么意思| 丰胸吃什么食物有效果| 嘴巴里长血泡是什么原因| 甲方是什么意思| 低压偏低是什么原因| 赵构为什么杀岳飞| 热射病是什么症状| 叫床什么意思| 红霉素软膏和红霉素眼膏有什么区别| 灯塔是什么意思| 吃什么增加卵泡| 4月11号是什么星座| runosd是什么牌子的手表| 美丽的动物是什么生肖| 拿的起放的下是什么意思| 脱发去医院挂什么科| 什么病| 为什么总是莫名其妙的想哭| 地龙是什么生肖| eicu是什么意思| 中耳炎是什么引起的| 微信英文名叫什么| 继发性肺结核是什么意思| 拍大腿内侧有什么好处| 小孩为什么经常流鼻血| 孔子姓什么| 海员是干什么的| 眼睛干涩有异物感用什么眼药水| 月经不来又没怀孕是什么原因| 人体含量最多的元素是什么| 红薯是什么茎| 肚子疼腹泻是什么原因| 怀孕抽烟对孩子有什么影响| 肝肿瘤吃什么食物好| olay是什么品牌| 什么时候种胡萝卜最好| eva鞋底是什么材质| 三点水真读什么| 教师资格证有什么用| 什么是心衰病| 适合是什么意思| 狗牯脑茶属于什么茶| 忘川是什么意思| 本能反应是什么意思| 排骨炖什么好吃| 阿僧只劫是什么意思| 述说是什么意思| ccp是什么意思| 腰椎骨质增生是什么意思| 什么含胶原蛋白最多| 吹风扇感冒了吃什么药| 下午5点到7点是什么时辰| 低密度脂蛋白胆固醇是什么意思| 枸橼酸西地那非片有什么副作用| mmp是什么意思| 下葬有什么讲究或忌讳| 杏有什么作用和功效| 菌群异常是什么意思| 如法炮制是什么意思| 什么是规培生| 40周年是什么婚| 跳舞有什么好处| 什么回忆| 蚊子长什么样| 湿热吃什么药| 六月十六是什么星座| 补气血什么季节补最好| cheese什么意思| 灌肠是什么| 什么睡姿对髋关节好| 过敏性紫癜什么症状| 9价疫苗适合什么年龄人打| 肠胃不好可以吃什么水果| 阑是什么意思| 坐骨神经吃什么药效果最好| 穿什么内衣好| 龙生九子下一句是什么| 天秤座男生喜欢什么样的女生| 子宫内膜炎症有什么症状| 力排众议是什么意思| 66岁属什么| 大名鼎鼎是什么意思| 金刚经讲的是什么| 纳囊是什么| 一学年是什么意思| 男人下面胀痛什么原因造成呢| 蛋蛋疼是什么原因| 宗是什么意思| 官方什么意思| 空调抽湿是什么意思| 农历12月是什么星座| 女人脸色发黄吃什么补得最快| cj是什么意思| 感冒头疼是什么原因| 放我鸽子是什么意思| 上海最高的楼叫什么| 鱼刺卡喉咙挂什么科| 三点水一个希读什么| 脾胃虚是什么症状| 2028年是什么年| 额窦炎吃什么药效果好| 喉咙痒吃什么药| 双相情感障碍是什么| 慢性结肠炎吃什么药好| 女性绝经前有什么症状| dwi是什么检查| 玉五行属性是什么| 什么渐渐什么| 手麻脚麻是什么原因引起的| swan是什么意思| pd-l1是什么| 刀郎和那英是什么关系| 维c有什么功效和作用| 落班是什么意思| 多囊挂什么科| 树菠萝什么时候成熟| 情节是什么| 轻奢是什么意思| 耳垂长痘痘是什么原因| 悲欢离合是什么意思| 寄生是什么意思| 四十年是什么婚| 急得很什么| 胃胀嗳气吃什么药最有效| 水为什么会结冰| 碧玺是什么材质| 肝肿大是什么原因| 脚底板发红是什么原因| 宝宝为什么打嗝| 生的反义词是什么| 什么梨最好吃| 休克是什么意思| 生意兴隆是什么意思| 老年人流鼻血是什么原因| 内蒙古代叫什么| 全职是什么意思| 十月一日是什么星座| 小孩脚抽筋是什么原因引起的| 大小眼是什么原因| 送老师什么礼物| 五味子不适合什么人喝| 红参对子宫有什么作用| 领事是什么级别| 胰腺的作用和功能是什么| 唇红齿白是什么生肖| 康波是什么意思| 甲亢什么不能吃| 肾阳虚和肾阴虚有什么区别症状| 中旬是什么意思| 咽炎咳嗽吃什么| 干扰素是治什么病的| 桃子是什么颜色| 儿童说话晚去医院挂什么科| 狡兔三窟什么意思| 退役和退伍有什么区别| 十月三十号什么星座| 儿童坐飞机需要什么证件| 安乐死什么意思| 丹参有什么功效| 喉咙有异物感看什么科| 右手发麻是什么病的前兆| 首长是什么意思| 陈皮和什么泡水喝最好| hct是什么| 橘猫是什么品种| 歌字五行属什么| 什么叫牙冠| 嘴唇上火起泡是什么原因| 嘴唇发紫是什么原因引起的| 74年出生属什么生肖| 64年属什么的| 肛肠科属于什么科| 碳13和碳14有什么区别| 张学友属什么生肖| 嫡传弟子是什么意思| 皮肤痒挂什么科| 什么是直系亲属| 登对是什么意思| 净身高是什么意思| 乱点鸳鸯谱什么意思| 眼睛痛吃什么药好得快| 我靠是什么意思| 省管干部是什么级别| 什么水果好吃| 一级军士长是什么级别| 无疾而终是什么意思| 尿酸高会引起什么疾病| 妊娠什么意思| 刘嘉玲什么星座| 什么是气溶胶| 例行是什么意思| 歼灭是什么意思| 口若悬河是指什么生肖| 浮萍是什么| 所以我求求你别让我离开你是什么歌| ab制是什么意思| 农历9月28日是什么星座| 百度

Blog Post

Windows OS Platform Blog
8 MIN READ

昙花是什么意思

Hari_Pulapaka's avatar
Hari_Pulapaka
Former Employee
Jul 01, 2024
百度 仔细逛完博物馆至少需要半小时,若想参观,建议提前2小时进入布宫大门。

In November 2023, Microsoft’s Brad Smith and Charlie Bell announced the Secure Future Initiative (SFI), a new initiative to pursue our next generation of cybersecurity protection. At Microsoft and Windows, we have a unique responsibility and leading role to play in securing the future for our customers and our community. As you saw in David Weston’s blog post on Windows 11 security, we have a longstanding commitment to security in Windows. We introduced the Secured-core PC to help secure from chip to cloud and that critical layer of computing. In Windows 11, hardware and software work together to help shrink the attack surface, protect system integrity, and shield valuable data. Windows 11 comes with several security advances that protect our customers from Credential and identity theft, such as Local Security Authority protection, Advanced key protection using VBS, Windows Hello hardening etc.

 

Along with credential protection, we also prioritized helping app developers better protect people from phishing attacks and malware. One of the key advances we have made in this area is a feature called VBS enclaves. With Windows 11* and Windows Server 2025, VBS enclaves are now available to third-party application developers.

 

The next sections of this blog post will describe VBS Enclaves, its internals and how to use VBS Enclaves as a developer.

 

VBS enclaves

A VBS enclave is a software-based trusted execution environment (TEE) inside a host application. This is a revolutionary change in our security model for the application, allowing an app to protect its secrets using the power of VBS, from admin-level attacks.

 

Some background: Virtualization Based Security (VBS) is the core feature of Windows used to the high value secrets stored within Windows (e.g., Credential Guard). VBS utilizes the Hyper-V hypervisor to create an environment that is higher privileged than the rest of the system kernel. Like VM isolation, the hypervisor sets memory protections in the second level address tables and IOMMU tables to isolate this environment from the rest of the system kernel. The secure kernel (part of VBS) can also provide memory integrity protection to the system kernel, ensuring the system loads only signed drivers that are not tampered with.

 

We are now extending the isolated user mode in the VBS environment to allow developers to protect portions of application data in a software-based trusted execution environment (TEE) known as a VBS enclave.

 

As mentioned, a VBS enclave is a software-based TEE inside the address space of a host application. It is a Dynamic Link Library (DLL) loaded by a standard Windows application. VBS enclaves can help secure secrets and sensitive operations in memory. The basic premise is that a VBS enclave can isolate a portion of your application that you want to secure while it is in memory – for example, to securely decrypt and process sensitive information. To understand how a VBS enclave isolates secrets, you’ll need to understand the underlying technology it leverages, VBS. As mentioned earlier, VBS uses the Windows Hyper-V hypervisor to create an isolated, privileged virtual environment known as Virtual Trust Level 1 (or VTL1) that becomes the root of trust of the OS. The traditional Windows environment is called VTL0. VTL1 is further split into isolated user mode and the secure kernel. Windows uses VTL1 to host many of its security features. The hypervisor uses the second level address tables to maintain access and privileges for these virtual trust levels. The higher the number, the higher the privilege level. This means everything in a higher VTL is isolated from everything in a lower VTL.

 

The isolation provided by VBS is the core technology that allows a VBS enclave to isolate a portion of an application in higher-privilege VTL1, inaccessible to VTL0. Let’s look at what an application hosting a VBS enclave looks like: 

 

 

The enclave hosting application lives in VTL0 and calls into the enclave when it needs to perform sensitive operations. Control is transferred to the VBS enclave, and the CPU register state is cleaned (except for specific parameter and result registers). Note that code and data inside a VBS enclave is inaccessible to VTL0 (including its own host application) and to other processes in VTL1. Code and data inside of a VBS enclave is visible only to the enclave itself, the VTL1 secure kernel, and the hypervisor.

 

At this point, you might be thinking “What’s stopping an attacker from exploiting the enclave in VTL1?” Good question! Though there is usually a process boundary between a non-Enclave application and a malicious actor in VTL0, by moving part of the application into VTL1, we add an additional boundary for the attacker to cross. This additional boundary is enforced by the hypervisor and is designed to be much more rigid. Think of VBS enclaves as a way to further harden your applications. VTL1 is a privileged space, and we don’t allow code other than Microsoft-signed code to run in the VTL1 secure kernel. The boundary between VTL0 and VTL1 is much more rigid to ensure that we can maintain this high bar.

 

This strong boundary doesn’t come for free. Accessing VTL1 is – at least more expensive than accessing VTL0 (we’re talking fractions of a millisecond here). Additionally, unlike VTL0 which has a lower barrier to entry, VTL1 requires all code to be signed. So, although VTL1 is a higher-privileged space, this privilege is maintained by requiring additional efforts by developers who wish to leverage VTL1. The nature of these efforts can be illustrated through some of the tenets VBS enclaves were designed with:

 

Limited API Surface

This is by design and serves a couple of purposes. Firstly, the smaller the range of functionality is within an enclave, the smaller the attack surface becomes. This ensures we can maintain the integrity of VTL1. Secondly, having a small API surface requires that you, the developer, think about how to best design your application so you only isolate what is critical in VTL1. Again, accessing VTL1 is comparatively expensive, so design your application wisely.

 

Code Integrity

Only code signed by Microsoft using a Trusted Signing VBS enclave certificate profile is permitted to run in an enclave. This includes loaded DLLs into the enclave. When control is handed from the VTL0 host application to the enclave, the VTL1 secure kernel will first verify that all the enclave code and data are authentic and are authorized to run inside of an enclave using image signature verification on the enclave image. This allows us to maintain our high bar for what we allow into VTL1.

 

This requirement means that developers are required to use Trusted Signing to obtain a certificate to production-sign their enclaves.

 

Attestation

Together with code integrity, VBS enclaves can generate attestation reports to attest to the state of the host system, the enclave itself, all DLLs that may have been loaded into the enclave, and whether the enclave is executing in debug mode. Note that once an enclave is initialized by the host application, the host can no longer modify the enclave and , to maintain the attestation state of the enclave throughout its lifetime. Attestation ensures that the code running in the enclave is exactly what you expect. Using a VBS enclave-generated attestation report and the MAA attestation service, you can attest to the state of the Enclave.

 

How do I use a VBS enclave?

You can use VBS enclaves to store secrets, seal data and perform decrypt operations, all in an isolated environment. The first step, as with any security feature, is thinking about secure design. VBS enclaves limit what you can do to maintain their security guarantees, so it isn’t as simple as moving the bulk of your application to live inside one.

 

Some considerations as you design an enclave:

  • A VBS enclave can be loaded by any application, not just the intended host application. Design your enclave without placing trust in the host application.
  • VBS enclaves operate by isolating from VTL0. To maintain the security promises of a VBS enclave, treat VTL0 as an untrusted environment. This includes not sending sensitive data outside of a VBS enclave. Only trust the enclave itself.
  • Ensure you understand the APIs available to you from within the enclave. Networking, for example, is not supported.

A sample use case of a VBS enclave is in Always Encrypted with secure enclaves for Azure SQL Database and SQL Server.

 

 

Always Encrypted protects the confidentiality of sensitive data from the database engine and administrators, placing trust only in the database clients to whom the data belongs. In the database, the sensitive data exists in an encrypted state. The data is only decrypted on the client side, where operations can be performed on it. In the database engine, operations are limited to equality checks.

 

Always Encrypted with secure enclaves, however, adds a VBS enclave to the database engine. When the database engine encounters computations on encrypted data, it delegates these computations to a VBS enclave, where the enclave decrypts the data and performs computations on plaintext. Employing a VBS enclave here makes it so database administrators cannot see the data inside the VBS enclave. With the use of VBS enclaves, Always Encrypted with secure enclaves can perform richer confidential queries and in-place cryptographic operations than Always Encrypted without secure enclaves, all without having to place trust in the database administrators.

 

The database client establishes a secure channel with the database engine containing the VBS enclave and identifies which columns are encrypted and manages encryption of these parameters in both directions. Now, when the database engine encounters operations on encrypted columns, it can delegate these to the VBS enclave. In the enclave the data can securely be decrypted if needed, and the operation can be performed.

 

Always Encrypted with secure enclaves is a fantastic use case of VBS enclaves:

 

  • The VBS enclave never reveals the decrypted information to the host application – the database engine in this case. It only trusts itself.
  • The database engine hosting the VBS enclave uses a secure channel (Transport Layer Security or TLS) to communicate with the database client.
  • By utilizing VBS enclaves, the database client no longer  performs all of the operations on sensitive data client-side after decrypting them.

 

The Always Encrypted with secure enclaves use case illustrates the importance of secure design when thinking about how to employ VBS enclaves in your application. When used effectively, VBS enclaves are a powerful tool.

 

Now that you understand VBS enclaves and all that they can do, jump into the docs here, or read on for a guide on how to build your first VBS enclave by following the development guide here.

 

We hope this blog has you as excited as we are to begin developing secure applications with VBS Enclaves on Windows 11* and Windows Server 2025! We look forward to your feedback! Also take a look at the Windows Security Book to learn more about Windows Security technologies.

 

Hilal Asmat, Akash Trehan, and Hari (on behalf of the enclaves team) 

 

*VBS Enclaves are available on Windows 11 Build 26100.2314 or later and Windows Server 2025 or later

Updated Nov 13, 2024
Version 5.0
指甲竖纹是什么原因 突然停经是什么原因 晚上老咳嗽是什么原因 什么样的人容易中风 总警监是什么级别
隐形眼镜半年抛是什么意思 什么是艾滋病 正畸是什么意思 什么是蝴蝶宝宝 女的排卵期一般是什么时间
桃符指的是什么 红薯用什么繁殖 粉色象征着什么 天丝棉是什么面料 毒瘾发作有什么症状
欣赏是什么意思 50岁吃什么钙片补钙效果好 灵长类动物是指什么 白细胞偏高有什么危害 青葱岁月下一句是什么
疫情是什么hcv7jop9ns8r.cn 与虎谋皮是什么生肖hcv7jop6ns7r.cn 体恤是什么意思hcv9jop0ns2r.cn 乳腺是什么科hcv8jop9ns4r.cn 乳腺3类是什么意思hcv9jop2ns0r.cn
后循环缺血是什么意思hcv8jop9ns0r.cn 圆脸适合什么发型好看hcv8jop8ns0r.cn 二氧化硅是什么东西hcv9jop6ns4r.cn 北芪煲汤加什么药材好hcv8jop2ns9r.cn 00后是什么意思hcv9jop0ns4r.cn
避孕药是什么原理hcv8jop5ns8r.cn 喝蜂蜜水对身体有什么好处hcv9jop6ns6r.cn 天无二日指什么生肖hcv7jop5ns1r.cn 护理学主要学什么hcv9jop1ns6r.cn 整天放屁是什么原因hcv8jop6ns4r.cn
男士内裤什么材质的好hcv7jop9ns7r.cn 塬字五行属什么hcv9jop4ns1r.cn 手指关节肿痛用什么药hcv8jop2ns8r.cn 大连机场叫什么名字fenrenren.com 儿童水杯什么材质好hcv8jop9ns7r.cn
百度