Trustworthy Memory Isolation of Linux on Embedded Devices

被引:1
|
作者
Nemati, Hamed [1 ]
Dam, Mads [1 ]
Guanciale, Roberto [1 ]
Do, Viktor [2 ]
Vahidi, Arash [2 ]
机构
[1] KTH Royal Inst Technol, Stockholm, Sweden
[2] SICS Swedish ICT, Lund, Sweden
关键词
D O I
10.1007/978-3-319-22846-4_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The isolation of security critical components from an untrusted OS allows to both protect applications and to harden the OS itself, for instance by run-time monitoring. Virtualization of the memory subsystem is a key component to provide such isolation. We present the design, implementation and verification of a virtualization platform for the ARMv7-A processor family. Our design is based on direct paging, an MMU virtualization mechanism previously introduced by Xen for the x86 architecture, and used later with minor variants by the Secure Virtual Architecture, SVA. We show that the direct paging mechanism can be implemented using a compact design, suitable for formal verification down to a low level of abstraction, without penalizing system performance. The verification is performed using the HOL4 theorem prover and uses a detailed model of the ARMv7-A ISA, including the MMU. We prove memory isolation of the hosted components along with information flow security for an abstract top level model of the virtualization mechanism. The abstract model is refined down to a HOL4 transition system closely resembling a C implementation. The virtualization mechanism is demonstrated on real hardware via a hypervisor capable of hosting Linux as an untrusted guest.
引用
收藏
页码:125 / 142
页数:18
相关论文
共 50 条
  • [31] Adaptive Flash Sorting for Memory-Constrained Embedded Devices
    Lawrence, Ramon
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 321 - 326
  • [32] Memory Carving in Embedded Devices: Separate the Wheat from the Chaff
    Gougeon, Thomas
    Barbier, Morgan
    Lacharme, Patrick
    Avoine, Gildas
    Rosenberger, Christophe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 592 - 608
  • [33] DEMIX: Domain-Enforced Memory Isolation for Embedded System
    Kim, Haeyoung
    Larasati, Harashta Tatimma
    Park, Jonguk
    Kim, Howon
    Kwon, Donghyun
    SENSORS, 2023, 23 (07)
  • [34] SEU meets embedded Linux
    Nisley, E
    DR DOBBS JOURNAL, 2001, 26 (03): : 129 - 131
  • [35] Webox for embedded Linux systems
    Lee, W
    Shin, D
    ESA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS AND APPLICATIONS, 2003, : 132 - 135
  • [36] Embedded Linux Consortium forms
    不详
    CONTROL ENGINEERING, 2000, 47 (04) : 30 - 30
  • [37] Embedded systems: Embedding linux
    Lennon, A.
    2001, Institution of Electrical Engineers (47):
  • [38] On the teaching of embedded Linux system
    Ko, Sung-Yuan
    2007 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOLS 1 AND 2, 2007, : 709 - 710
  • [39] Embedded Linux in Engineering Education
    Blank, M.
    Brunner, S.
    Fuhrmann, T.
    Meier, H.
    Niemetz, M.
    PROCEEDINGS OF 2015 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON), 2015, : 145 - 150
  • [40] Development of a Quadrotor with Embedded Linux
    Reader, D.
    Huang, L.
    2014 13TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION (ICARCV), 2014, : 1548 - 1553