Dancing With Giants: Wimpy Kernels For On-Demand Isolated I/O
IEEE Symposium on Security and Privacy(2014)
摘要
To be trustworthy, security-sensitive applications must be formally verified and hence small and simple; i.e., wimpy. Thus, they cannot include a variety of basic services available only in large and untrustworthy commodity systems; i.e., in giants. Hence, wimps must securely compose with giants to survive on commodity systems; i.e., rely on giants' services but only after efficiently verifying their results. This paper presents a security architecture based on a wimpy kernel that provides on-demand isolated I/O channels for wimp applications, without bloating the underlying trusted computing base. The size and complexity of the wimpy kernel are minimized by safely outsourcing I/O subsystem functions to an untrusted commodity operating system and exporting driver and I/O subsystem code to wimp applications. Using the USB subsystem as a case study, this paper illustrates the dramatic reduction of wimpy-kernel size and complexity; e.g., over 99% of the USB code base is removed. Performance measurements indicate that the wimpy kernel architecture exhibits the desired execution efficiency.
更多查看译文
关键词
tcb reduction,export and mediate,trusted computing base,outsource and verify,wimpy kernels,on-demand i/o isolation,computer security,kernel,computer architecture,process control,hardware
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要