Dancing With Giants: Wimpy Kernels For On-Demand Isolated I/O

IEEE Symposium on Security and Privacy(2014)

引用 45|浏览72
暂无评分
摘要
To be trustworthy, security-sensitive applications must be formally verified and hence small and simple; i.e., wimpy. Thus, they cannot include a variety of basic services available only in large and untrustworthy commodity systems; i.e., in giants. Hence, wimps must securely compose with giants to survive on commodity systems; i.e., rely on giants' services but only after efficiently verifying their results. This paper presents a security architecture based on a wimpy kernel that provides on-demand isolated I/O channels for wimp applications, without bloating the underlying trusted computing base. The size and complexity of the wimpy kernel are minimized by safely outsourcing I/O subsystem functions to an untrusted commodity operating system and exporting driver and I/O subsystem code to wimp applications. Using the USB subsystem as a case study, this paper illustrates the dramatic reduction of wimpy-kernel size and complexity; e.g., over 99% of the USB code base is removed. Performance measurements indicate that the wimpy kernel architecture exhibits the desired execution efficiency.
更多
查看译文
关键词
tcb reduction,export and mediate,trusted computing base,outsource and verify,wimpy kernels,on-demand i/o isolation,computer security,kernel,computer architecture,process control,hardware
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要