Scalable Architectural Support for Trusted Software

被引:0
|
作者
Champagne, David [1 ]
Lee, Ruby B. [1 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
来源
HPCA-16 2010: SIXTEENTH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, PROCEEDINGS | 2010年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present Bastion, a new hardware-software architecture for protecting security-critical software modules in an untrusted software stack. Our architecture is composed of enhanced microprocessor hardware and enhanced hypervisor software. Each trusted software module is provided with a secure, fine-grained memory compartment and its own secure persistent storage area. Bastion is the first architecture to provide direct hardware protection of the hypervisor from both software and physical attacks, before employing the hypervisor to provide the same protection to security-critical OS and application modules. Our implementation demonstrates the feasibility of bypassing an untrusted commodity OS to provide application security and shows better security with higher performance when compared to the Trusted Platform Module (TPM), the current industry state-of-the-art security chip. We provide a proof-of-concept implementation on the OpenSPARC platform.
引用
收藏
页码:31 / 42
页数:12
相关论文
共 50 条
  • [41] Trusted Software Repair for System Resiliency
    Weimer, Westley
    Forrest, Stephanie
    Kim, Miryung
    Le Goues, Claire
    Hurley, Patrick
    2016 46TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2016, : 238 - 241
  • [42] Trusted Software's Holy Grail
    Jeffrey Voas
    Software Quality Journal, 2003, 11 : 9 - 17
  • [43] mTSS - A Simplified Trusted Software Stack
    Stuble, Christian
    Zaerin, Anoosheh
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 124 - 140
  • [44] Future Software for Life in Trusted Futures
    Pink, Sarah
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 1 - 1
  • [45] The Trust Management Model of Trusted Software
    Wu Jin
    Liao Yongjian
    Nie Xuyun
    Liu Mengjuan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 534 - 537
  • [46] Modeling Trusted Software with Process Algebras
    Yang Jie
    Peng Zhen
    Li Guo-dong
    Qi De-yu
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 123 - +
  • [47] Trusted software's holy grail
    Voas, J
    SOFTWARE QUALITY JOURNAL, 2003, 11 (01) : 9 - 17
  • [48] Research on Software Trusted Dynamic Measurement
    Hao, Rui
    Peng, Xinguang
    Xiu, Lei
    MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1869 - +
  • [49] Towards trusted composition in software design
    Dong, J
    Yang, S
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 306 - 307
  • [50] A New Trusted Software Modeling Method
    Yang Jie
    Li Yi
    Yu Min-cong
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 889 - 893