Filters








10,540 Hits in 7.2 sec

Enclave-Aware Compartmentalization and Secure Sharing with Sirius [article]

Zahra Tarkhani, Anil Madhavapeddy
2020 arXiv   pre-print
We introduce Sirius, the first compartmentalization framework that achieves strong isolation and secure sharing in TEE-assisted applications by controlling the dataflows within primary kernel objects (  ...  This lack of information causes an ever-increasing set of attacks on TEE-enabled applications that exploit various insecure interactions with the host OSs, applications, or other enclaves.  ...  We implemented a hash table-based registry to make operations (store/set/get/remove) on these data structures more efficient.  ... 
arXiv:2009.01869v3 fatcat:bgqsmluzdjdkxliiun6ttijqty

The Clouds distributed operating system

P. Dasgupta, R.J. LeBlanc, M. Ahamad, U. Ramachandran
1991 Computer  
The Clouds operating system is built on top of a kernel called Ra. Ra ís a second generation kernel derived from our experience with the first version of the Clouds operating system.  ...  Rø is a minimal, flexible kernel that provides a framework for implementing a variety of distributed operating systems.  ...  The Design and Implementation of the Clouds Distibuted Operating Systeru 43  ... 
doi:10.1109/2.116849 fatcat:bkfhux2msbfc5cn3skt7d33ubq

Grasshopper: An Orthogonally Persistent Operating System

Alan Dearle, Rex di Bona, James Farrow, Frans A. Henskens, Anders Lindström, John Rosenberg, Francis Vaughan
1994 Computing Systems  
Acknowledgments V/e would like to thank Karen Wyrwas, Alex Farkas, Stephen Norris, Fred Brown and David Hulse for comments on earlier versions of this paper.  ...  The intemal state of kernel data structures also forms part of the state of a user program. For example, the granting of capabilities to loci must be recorded.  ...  It would seem that the implementation of a single partitioning scheme would be more efficient than the use of separate schemes to support each management requirement.  ... 
dblp:journals/csys/DearleBFHLRV94 fatcat:awiyt5p4jvdsncddksvrgasx34

Analysis of three multilevel security architectures

Timothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen
2007 Proceedings of the 2007 ACM workshop on Computer security architecture - CSAW '07  
We introduce the Least Privilege architecture, which incorporates security features from the recent "Separation Kernel Protection Profile," and show how it can provide several unique aspects of security  ...  This paper provides an analysis of the relative merits of three architectural types -one based on a security kernel, another based on a traditional separation kernel, and a third based on a least-privilege  ...  At least one of the partitions is allowed (via PK configuration data) to read and write data in all of the other partitions.  ... 
doi:10.1145/1314466.1314473 dblp:conf/ccs/LevinIWN07 fatcat:pvyu3olitnc5bp7rfstjauujwq

Parallel programming inPanda

H. Assenmacher, T. Breitbach, P. Buhler, V. H�bsch, H. Peine, R. Schwarz
1995 Journal of Supercomputing  
The problem of sharing data in a distributed environment is discussed, and the performance of appropriate mechanisms provided by the PANDA prototype implementation is assessed.  ...  PANDA supplies means for fast user-level threads, and for a transparent and coordinated sharing of objects across a homogeneous network.  ...  The simulation shares data at the level of small objects, each protected by a lock.  ... 
doi:10.1007/bf01245398 fatcat:4pbinhfjjfbvdh6ygzj3gskb3u

kMVX

Sebastian Österlund, Koen Koning, Pierre Olivier, Antonio Barbalace, Herbert Bos, Cristiano Giuffrida
2019 Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '19  
Traditional MVX designs cannot be applied to kernels because of their assumptions on the run-time environment. kMVX, on the other hand, can be applied even to commodity kernels.  ...  We show our Linux-based prototype provides powerful protection against information leaks at acceptable performance overhead (20-50% in the worst case for popular server applications).  ...  The funding agencies are not responsible for any use that may be made of the information it contains.  ... 
doi:10.1145/3297858.3304054 dblp:conf/asplos/OsterlundKOBBG19 fatcat:dokkcvtczbe4fgwd3ht77myrka

DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors

Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, Joel Emer
2018 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)  
We are grateful to Carl Waldspurger for his valuable feedback on the initial design as well as the final presentation of this paper.  ...  the efficient sizes of protection domains for a given workload.  ...  This allows the kernel to efficiently copy from warm cache lines, but preserves isolation.  ... 
doi:10.1109/micro.2018.00083 dblp:conf/micro/KirianskyLADE18 fatcat:dcxkoz3pdzbujorqukwpmeocw4

Shielding Software From Privileged Side-Channel Attacks

Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, Sandhya Dwarkadas
2018 USENIX Security Symposium  
Shielding systems such as InkTag, Haven, and Virtual Ghost protect sensitive application data from compromised OS kernels. However, such systems are still vulnerable to side-channel attacks.  ...  via side channels.  ...  in the processor to steal data and then exfiltrates the stolen data via existing side channels.  ... 
dblp:conf/uss/DongSCCD18 fatcat:3gvp7yemobcr3ps5v2im7jae5y

Mils Compliant Software Architecture For Satellites

H.J. Herpel, M. Kerep, G. Montano, K. Eckstein, M. Schön, A. Krutak
2016 International Conference on High Performance Embedded Architectures and Compilers  
First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC.  ...  Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats.  ...  ACKNOWLEDGMENTS The authors thank the ESA for supporting the study Software Elements for Security Partition Communication Controller through a research fund.  ... 
doi:10.5281/zenodo.47973 dblp:conf/hipeac/HerpelKMESK16 fatcat:oetxwwhn2raefd5zrsb63fa2ua

A multi-layered approach to security in high assurance systems

J. Alves-Foss, C. Taylor, P. Oman
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
Past efforts at designing and implementing ultra high assurance systems for government security and safety have centered on the concept of a monolithic security kernel responsible for a system-wide security  ...  The framework supports multiple levels of safety and multiple levels of security, based on the principle of creating separate layers of responsibility and control, with each layer responsible for enforcing  ...  Instructions and data are accessed via a memory map that is controlled by the PK. All partitions are separated in time through the partition scheduler in the kernel.  ... 
doi:10.1109/hicss.2004.1265709 dblp:conf/hicss/Alves-FossTO04 fatcat:4vrbgao35bhhjjdrnos5ss5l7i

A security architecture for transient trust

Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark, Thuy D. Nguyen
2008 Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08  
Interaction among subjects in different partitions is controlled by a high assurance separation kernel, and efficient use of devices is achieved through the application of a three-part device model.  ...  Allocated to partitions, these domains are entered via a high integrity trusted path service located in a separate trusted partition.  ...  " that is protected by a highly robust separation kernel  ... 
doi:10.1145/1456508.1456510 dblp:conf/ccs/IrvineLCN08 fatcat:yqjtytmbkjdgdnh5yysg7dd3ta

Inter-kernel Communication between Multiple Kernels on Multicore Machines

Taku Shimosawa, Yutaka Ishikawa
2009 IPSJ Online Transactions  
The mechanism has been integrated into another mechanism called SHIMOS that partitions the CPUs, the memory, and I/O devices.  ...  Several sets of benchmark results demonstrate that SHIMOS is faster than modern virtual machines. For system calls, SHIMOS achieves about seven times faster than the Xen virtual machine.  ...  Acknowledgments This work is partially supported by a CREST project of JST (Japan Science and Technology).  ... 
doi:10.2197/ipsjtrans.2.261 fatcat:aiqfbpbyyrc5bddyd4xetjtlny

Efficient Monte Carlo Sampler for Detecting Parametric Objects in Large Scenes [chapter]

Yannick Verdié, Florent Lafarge
2012 Lecture Notes in Computer Science  
Point processes have demonstrated efficiency and competitiveness when addressing object recognition problems in vision.  ...  The performances of the sampler are analyzed through a set of experiments on various object recognition problems from large scenes, and through comparisons to the existing algorithms.  ...  Note also that the hierarchical partitioning of K protects the sample from mosaic effects.  ... 
doi:10.1007/978-3-642-33712-3_39 fatcat:tfd25glhzrd6bcgfmpzenbmqeu

A New Approach to Memory Partitioning in On-Board Spacecraft Software [chapter]

Santiago Urueña, José A. Pulido, Jorge López, Juan Zamorano, Juan A. de la Puente
2008 Lecture Notes in Computer Science  
Both approaches provide safe memory partitioning with less overhead than current IMA techniques.  ...  Two alternative approaches are discussed in the paper, based on some features of Ada and state-of-the art compilation tool-chains.  ...  The meta-linker also creates some data structures describing the layout of the partition. This information is needed by the kernel to adjust the fence registers in each context switch.  ... 
doi:10.1007/978-3-540-68624-8_1 fatcat:iupueqlgj5fetbadfnzbbgukne

Using a Multi-Tasking VM for Mobile Applications

Yin Yan, Chunyu Chen, Karthik Dantu, Steven Y. Ko, Lukasz Ziarek
2016 Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications - HotMobile '16  
This paper discusses the potential benifits of switching Android's single VM per application runtime environment to a multi-tasking VM environment.  ...  A multi-tasking VM is a type of a Java virtual machine with the ability to execute multiple Java applications in one memory space. It does so by isolating the applications to prevent interferences.  ...  For example, Android's messaging objects, Intent or Message, transfer their data object Bundle via Android's Binder calls.  ... 
doi:10.1145/2873587.2873596 dblp:conf/wmcsa/YanCDKZ16 fatcat:hin5dztjhzcrlhvft5uyzfi4mq
« Previous Showing results 1 — 15 out of 10,540 results