Practical Principle of Least Privilege for Secure Embedded Systems

被引:16
|
作者
Jero, Samuel [1 ]
Furgala, Juliana [1 ]
Pan, Runyu [2 ]
Gadepalli, Phani Kishore [2 ]
Clifford, Alexandra [1 ,3 ]
Ye, Bite [2 ]
Khazan, Roger [1 ]
Ward, Bryan C. [1 ]
Parmer, Gabriel [2 ]
Skowyra, Richard [1 ]
机构
[1] MIT, Lincoln Lab, Cambridge, MA 02139 USA
[2] George Washington Univ, Washington, DC 20052 USA
[3] Draper Lab, Cambridge, MA USA
关键词
D O I
10.1109/RTAS52030.2021.00009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many embedded systems have evolved from simple bare-metal control systems to highly complex network-connected systems. These systems increasingly demand rich and feature-full operating-systems (OS) functionalities. Furthermore, the network connectedness offers attack vectors that require stronger security designs. To that end, this paper defines a prototypical RTOS API called Patina that provides services common in feature-rich OSes (e.g., Linux) but absent in more trustworthy mu-kernel-based systems. Examples of such services include communication channels, timers, event management, and synchronization. Two Patina implementations are presented, one on Composite and the other on seL4, each of which is designed based on the Principle of Least Privilege (PoLP) to increase system security. This paper describes how each of these mu-kernels affect the PoLP-based design, as well as discusses security and performance tradeoffs in the two implementations. Results of comprehensive evaluations demonstrate that the performance of the PoLP-based implementation of Patina offers comparable or superior performance to Linux, while offering heightened isolation.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 50 条
  • [1] Implementing the principle of least administrative privilege on operating systems: challenges and perspectives
    Billoir, Eddie
    Laborde, Romain
    Wazan, Ahmad Samer
    Ruetschle, Yves
    Benzekri, Abdelmalek
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (11-12) : 857 - 880
  • [2] TOWARDS WORKING SET BASED APPROXIMATION OF LEAST PRIVILEGE PRINCIPLE FOR OPERATING SYSTEMS
    Praher, Christian P.
    IDIMT-2012: ICT SUPPORT FOR COMPLEX SYSTEMS, 2012, 38 : 101 - 108
  • [3] Enforcing the principle of least privilege with a state-based privilege control model
    Liang, B
    Liu, H
    Shi, WC
    Wu, YJ
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 109 - 120
  • [4] Secure automation: Achieving least privilege with SSH, sudo and setuid
    Napier, RA
    USENIX Association Proceedings of the Eighteenth Large Installation System Administration Conference, 2004, : 203 - 212
  • [5] Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux
    Billoir, Eddie
    Laborde, Romain
    Wazan, Ahmad Samer
    Benzekri, Abdelmalek
    Rutschle, Yves
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [6] PRACTICAL USE OF GAUSS PRINCIPLE OF LEAST CONSTRAINT
    VUJANOVIC, B
    JOURNAL OF APPLIED MECHANICS-TRANSACTIONS OF THE ASME, 1976, 43 (03): : 491 - 496
  • [7] Automated Enforcement of the Principle of Least Privilege over Data Source Access
    Wu, Haoqi
    Yu, Zhengxuan
    Huang, Dapeng
    Zhang, Haodong
    Han, Weili
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 510 - 517
  • [8] CHERI: A Hardware-Software System to Support the Principle of Least Privilege
    Watson, Robert N. M.
    Moore, Simon W.
    Neumann, Peter G.
    ERCIM NEWS, 2016, (106): : 23 - +
  • [9] Secure Architecture for Embedded Systems
    Vai, Michael
    Nahill, Ben
    Kramer, Josh
    Geis, Michael
    Utin, Dan
    Whelihan, David
    Khazan, Roger
    2015 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2015,
  • [10] PRACTICAL USE OF GAUSS' PRINCIPLE OF LEAST CONSTRAINT.
    Vujanovic, B.
    American Society of Mechanical Engineers (Paper), 1976, (76 -APM-P):