Trustworthy Memory Isolation of Linux on Embedded Devices

被引:1
|
作者
Nemati, Hamed [1 ]
Dam, Mads [1 ]
Guanciale, Roberto [1 ]
Do, Viktor [2 ]
Vahidi, Arash [2 ]
机构
[1] KTH Royal Inst Technol, Stockholm, Sweden
[2] SICS Swedish ICT, Lund, Sweden
关键词
D O I
10.1007/978-3-319-22846-4_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The isolation of security critical components from an untrusted OS allows to both protect applications and to harden the OS itself, for instance by run-time monitoring. Virtualization of the memory subsystem is a key component to provide such isolation. We present the design, implementation and verification of a virtualization platform for the ARMv7-A processor family. Our design is based on direct paging, an MMU virtualization mechanism previously introduced by Xen for the x86 architecture, and used later with minor variants by the Secure Virtual Architecture, SVA. We show that the direct paging mechanism can be implemented using a compact design, suitable for formal verification down to a low level of abstraction, without penalizing system performance. The verification is performed using the HOL4 theorem prover and uses a detailed model of the ARMv7-A ISA, including the MMU. We prove memory isolation of the hosted components along with information flow security for an abstract top level model of the virtualization mechanism. The abstract model is refined down to a HOL4 transition system closely resembling a C implementation. The virtualization mechanism is demonstrated on real hardware via a hypervisor capable of hosting Linux as an untrusted guest.
引用
收藏
页码:125 / 142
页数:18
相关论文
共 50 条
  • [1] Trustworthy Prevention of Code Injection in Linux on Embedded Devices
    Chfouka, Hind
    Nemati, Hamed
    Guanciale, Roberto
    Dam, Mads
    Ekdahl, Patrik
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 90 - 107
  • [2] Trustworthy isolation of DMA devices
    Jonas Haglund
    Roberto Guanciale
    Journal of Banking and Financial Technology, 2020, 4 (1): : 75 - 94
  • [3] Memory Leak Detection Runtime-Service for Embedded Linux Devices
    Beneder, Roman
    Glatz, Bernd
    Horauer, Martin
    Rauscher, Thomas
    2014 IEEE EMERGING TECHNOLOGY AND FACTORY AUTOMATION (ETFA), 2014,
  • [4] Trustworthy Isolation of DMA Enabled Devices
    Haglund, Jonas
    Guanciale, Roberto
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 35 - 55
  • [5] Performance Measurement Automation for Linux Embedded Devices
    Ann, Wooram
    Awasthi, Prabhat
    Chae, Jihun
    Lee, Taeyoung
    Hahm, Cheulhee
    2018 IEEE 8TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - BERLIN (ICCE-BERLIN), 2018,
  • [6] Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)
    Armknecht, Frederik
    Guajardo, Jorge
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1548 - 1549
  • [7] Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015)
    Guajardo, Jorge
    Katzenbeisser, Stefan
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1715 - 1716
  • [8] MEMORY ALLOCATION IN EMBEDDED DEVICES
    Larmour, Vicky
    ELECTRONICS WORLD, 2009, 115 (1881): : 8 - 9
  • [9] Designing and Implementing an Embedded Linux for Limited Resource Devices
    Lyytinen, Hannu
    Haataja, Keijo
    Toivanen, Pekka
    2009 EIGHTH INTERNATIONAL CONFERENCE ON NETWORKS, 2009, : 18 - 23
  • [10] Provably secure memory isolation for Linux on ARM
    Guanciale, Roberto
    Nemati, Hamed
    Dam, Mads
    Baumann, Christoph
    JOURNAL OF COMPUTER SECURITY, 2016, 24 (06) : 793 - 837