Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86

被引:12
|
作者
Lee, Hojoon [1 ]
Song, Chihyun [2 ]
Kang, Brent Byunghoon [2 ]
机构
[1] CISPA Helmholtz Ctr iG, Saarbrucken, Germany
[2] Korea Adv Inst Sci & Technol, GSIS, Sch Comp, Daejeon, South Korea
基金
新加坡国家研究基金会;
关键词
privilege separation; memory protection; operating system;
D O I
10.1145/3243734.3243748
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modern applications often involve processing of sensitive information. However, the lack of privilege separation within the user space leaves sensitive application secret such as cryptographic keys just as unprotected as a "hello world" string. Cutting-edge hardware-supported security features are being introduced. However, the features are often vendor-specific or lack compatibility with older generations of the processors. The situation leaves developers with no portable solution to incorporate protection for the sensitive application component. We propose LOTRx86, a fundamental and portable approach for user-space privilege separation. Our approach creates a more privileged user execution layer called PrivUser by harnessing the underused intermediate privilege levels on the x86 architecture. The PrivUser memory space, a set of pages within process address space that are inaccessible to user mode, is a safe place for application secrets and routines that access them. We implement the LOTRx86 ABI that exports the privcall interface to users to invoke secret handling routines in PrivUser. This way, sensitive application operations that involve the secrets are performed in a strictly controlled manner. The memory access control in our architecture is privilege-based, accessing the protected application secret only requires a change in the privilege, eliminating the need for costly remote procedure calls or change in address space. We evaluated our platform by developing a proof-of-concept LOTRx86-enabled web server that employs our architecture to securely access its private key during an SSL connection. We conducted a set of experiments including a performance measurement on the PoC on both Intel and AMD PCs, and confirmed that LOTRx86 incurs only a limited performance overhead.
引用
收藏
页码:1441 / 1454
页数:14
相关论文
共 50 条
  • [21] The x86 gets faster with age
    Halfhill, TR
    BYTE, 1996, 21 (11): : 89 - &
  • [22] A NEW X86 CORE ARCHITECTURE FOR THE NEXT GENERATION OF COMPUTING
    Clark, Mike
    2016 IEEE HOT CHIPS 28 SYMPOSIUM (HCS), 2016,
  • [23] x86 enters the multimedia era
    Halfhill, TR
    BYTE, 1996, 21 (07): : 59 - 60
  • [24] Verifying x86 Instruction Implementations
    Goel, Shilpi
    Slobodova, Anna
    Sumners, Rob
    Swords, Sol
    CPP '20: PROCEEDINGS OF THE 9TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS, 2020, : 47 - 60
  • [25] Bringing Virtualization to the x86 Architecture with the Original VMware Workstation
    Bugnion, Edouard
    Devine, Scott
    Rosenblum, Mendel
    Sugerman, Jeremy
    Wang, Edward Y.
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2012, 30 (04):
  • [26] Information security in multiprocessor systems based on the X86 architecture
    Torrubia, A
    Mora, FJ
    COMPUTERS & SECURITY, 2000, 19 (06) : 559 - 563
  • [27] The impact of x86 instruction set architecture on superscalar processing
    Rico, R
    Pérez, JI
    Frutos, JA
    JOURNAL OF SYSTEMS ARCHITECTURE, 2005, 51 (01) : 63 - 77
  • [28] Native Client: A Sandbox for Portable, Untrusted x86 Native Code
    Yee, Bennet
    Sehr, David
    Dardyk, Gregory
    Chen, J. Bradley
    Muth, Robert
    Ormandy, Tavis
    Okasaka, Shiki
    Narula, Neha
    Fullagar, Nicholas
    COMMUNICATIONS OF THE ACM, 2010, 53 (01) : 91 - 99
  • [29] Native Client: A Sandbox for Portable, Untrusted x86 Native Code
    Yee, Bennet
    Sehr, David
    Dardyk, Gregory
    Chen, J. Bradley
    Muth, Robert
    Ormandy, Tavis
    Okasaka, Shiki
    Narula, Neha
    Fullagar, Nicholas
    PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 79 - 93
  • [30] USING X86 MODE SWITCHING FOR PROGRAM CODE PROTECTION
    Lebedev, R. K.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2023, (61): : 104 - 120