首页> 外文学位 >Secure Program Execution Through Hardware-Supported Isolation
【24h】

Secure Program Execution Through Hardware-Supported Isolation

机译:通过硬件支持的隔离来安全地执行程序

获取原文
获取原文并翻译 | 示例

摘要

One of the challenges in securing today's computing systems is how to efficiently protect critical parts of security-sensitive applications from attacks that are launched using untrusted or compromised system software layers. Modern operating systems (OS) and virtualization layers are growing into large and very complex pieces of code. Due to their large size and complexity, it is virtually impossible to design them without exploitable vulnerabilities. Despite a plethora of protection techniques, many recent attacks that exploit vulnerabilities in systems code that bypass existing protections have been successfully demonstrated. Instead of attempting to prevent software bugs or mitigating all possible routes for their exploitation, a fundamentally different approach is to completely isolate security-sensitive parts of application code from potentially compromised system software layers. With significant interest from many hardware vendors including Intel, ARM, AMD and IBM, isolated execution has a potential to become a future standard of secure computing.;The first part of this dissertation work is dedicated to analyzing challenges in traditional systems and introducing Iso-X --- a flexible hardware-managed architecture for supporting isolated execution. Isolation in Iso-X is achieved by creating and dynamically managing compartments (isolated software modules) to host critical fragments of code and associated data. The proposed solution provides fine-grained isolation at the memory-page level, flexible allocation of memory, and a low-complexity and hardware-only trusted computing base. It requires minimal additional hardware, a small number of new ISA instructions to manage compartments, and minimal changes to the operating system.;Then, we examine some future challenges faced by isolated execution environments. In particular, we discuss the vulnerability of isolated systems to side-channel and covert channel attacks due to shared physical hardware resources. Then, demonstration of several such new attacks that apply to both traditional and isolated systems is presented along with description of possible mitigation strategies.
机译:保护当今计算系统安全的挑战之一是如何有效地保护安全敏感型应用程序的关键部分,使其免受使用不受信任或受损的系统软件层发起的攻击。现代操作系统(OS)和虚拟化层正在成长为大型且非常复杂的代码段。由于它们的大小和复杂性,如果没有可利用的漏洞,几乎不可能设计它们。尽管有大量的保护技术,但最近已成功展示了许多利用系统代码中的漏洞绕过现有保护措施的攻击。一种根本不同的方法不是试图防止软件错误或减轻利用它们的所有可能途径,而是从可能受损的系统软件层完全隔离应用程序代码的安全敏感部分。在包括英特尔,ARM,AMD和IBM在内的许多硬件供应商的浓厚兴趣下,隔离执行有可能成为安全计算的未来标准。本论文的第一部分致力于分析传统系统中的挑战并介绍Iso- X ---灵活的硬件管理体系结构,用于支持隔离执行。通过创建和动态管理隔离专区(隔离的软件模块)来托管代码和相关数据的关键片段,可以实现Iso-X中的隔离。所提出的解决方案在内存页面级别提供了细粒度的隔离,灵活的内存分配以及低复杂度和仅硬件受信任的计算基础。它需要最少的附加硬件,少量的新ISA指令来管理隔离专区以及对操作系统的最小更改。然后,我们研究了隔离执行环境所面临的一些未来挑战。特别是,我们讨论了由于共享的物理硬件资源而导致的隔离系统对侧通道和隐通道攻击的脆弱性。然后,对适用于传统系统和隔离系统的几种此类新攻击进行了演示,并给出了可能的缓解策略。

著录项

  • 作者

    Evtyushkin, Dmitry.;

  • 作者单位

    State University of New York at Binghamton.;

  • 授予单位 State University of New York at Binghamton.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 219 p.
  • 总页数 219
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 水产、渔业;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号