An operating system design for the security architecture for microprocessors

被引:0
|
作者
Platte, Joerg [1 ]
Diaz, Raul Duran [1 ]
Naroska, Edwin [1 ]
机构
[1] Univ Dortmund, Abt Informat Tech, Inst Roboterforsch, D-44221 Dortmund, Germany
关键词
secure operating systems; certified execution; encrypted programs; secure processors;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
SAM is a processor extension used to protect execution of dedicated programs by preventing data disclosure and program manipulations in a multitasking environment. This paper presents an operating system design based on the Linux kernel for SAM. The design splits the kernel into a very small protected part and an unprotected part used by drivers and high level functions. Using this kernel protected and unprotected programs can be executed in parallel without diminishing the protection. The protection mechanism does not slow down the execution of unprotected programs, since it is only active during the execution of protected programs.
引用
收藏
页码:174 / +
页数:3
相关论文
共 50 条
  • [1] A cache design for a security architecture for microprocessors (SAM)
    Platte, J
    Naroska, E
    Grundmann, K
    ARCHITECTURE OF COMPUTING SYSTEMS - ARCS 2006, PROCEEDINGS, 2006, 3894 : 435 - 449
  • [2] Design for Security Operating System
    Zhu, Wenzheng
    Lee, Changhoon
    2009 THIRD ASIA INTERNATIONAL CONFERENCE ON MODELLING & SIMULATION, VOLS 1 AND 2, 2009, : 667 - 670
  • [3] A security enhancement architecture for COTS operating system
    Zemao, Chen
    Yi, Liu
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 434 - +
  • [4] ARCHITECTURE IMPLICATIONS IN THE DESIGN OF MICROPROCESSORS
    MATICK, RE
    LING, DT
    IBM SYSTEMS JOURNAL, 1984, 23 (03) : 264 - 280
  • [5] Designing and modeling security architecture of a secure operating system
    Liang, HL
    Sun, YF
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 202 - 205
  • [6] The security architecture of the Java']Java operating system JX -: A security architecture for distributed parallel computing
    Wawersich, C
    Felser, M
    Golm, M
    Kleinöder, J
    ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2003, 2834 : 85 - 95
  • [7] OPERATING SYSTEM DESIGN WITH SECURITY AS AN OBJECTIVE.
    Sevcik, K.C.
    Tsichritzis, D.C.
    INFOR Journal, 1975, 13 (02): : 159 - 174
  • [8] Design and implementation MAC in security operating system
    Cai, Y
    Zheng, ZR
    Shen, CX
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 216 - 219
  • [9] THE INTERACTION OF ARCHITECTURE AND OPERATING SYSTEM-DESIGN
    ANDERSON, TE
    LEVY, HM
    BERSHAD, BN
    LAZOWSKA, ED
    SIGPLAN NOTICES, 1991, 26 (04): : 108 - 120
  • [10] A new encryption and hashing scheme for the security architecture for microprocessors
    Platte, Joerg
    Diaz, Raul Duran
    Naroska, Edwin
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 120 - 129