skip to main content
10.1145/1133572.1133615acmconferencesArticle/Chapter ViewAbstractPublication PagesewConference Proceedingsconference-collections
Article

Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors

Published:19 September 2004Publication History

ABSTRACT

Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness.In this paper, we oppose the view that virtual-machine monitors (VMMs) are the smallest systems that provide secure isolation because they have been specifically designed to provide little more than this property. The problem with this assertion is that VMMs typically do not support interprocess communication, complicating the use of untrusted components inside a secure systems.We propose extending traditional VMMs with features for secure message passing and memory sharing to enable the use of untrusted components in secure systems. We argue that moving system components out of the TCB into the untrusted part of the system and communicating with them using IPC reduces the overall size of the TCB.We argue that many secure applications can make use of untrusted components through trusted wrappers without risking security properties such as confidentiality and integrity.

References

  1. Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the art of virtualization. In Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164--177. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Norman Feske and Hermann Härtig. DOpE---a window server for real-time and embedded systems. Technical Report TUD-FI03-10-September-2003, TU Dresden, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bryan Ford, Mike Hibler, Jay Lepreau, Roland McGrath, and Patrick Tullmann. Interface and execution models in the Fluke kernel. In Proceedings of the third symposium on Operating systems design and implementation, pages 101--115. USENIX Association, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 193--206. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Morrie Gasser. Building a secure computer system. Van Nostrand Reinhold Co., 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Härtig, M. Hohmuth, J. Liedtke, S. Schönberg, and J. Wolter. The performance of μ-kernel-based systems. In Proceedings of the 16th ACM Symposium on Operating System Principles (SOSP), pages 66--77, Saint-Malo, France, October 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hermann Härtig. Security architectures revisited. In Proceedings of the Tenth ACM SIGOPS European Workshop, Saint-Emilion, France, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Helmuth, A. Westfeld, and M. Sobirey. μSINA - Eine mikro-kernbasierte Systemarchitektur für sichere Systemkomponenten. In Deutscher IT-Sicherheitskongress des BSI, volume 8 of IT-Sicherheit im verteilten Chaos, pages 439--453. Secumedia-Verlag Ingelsheim, May 2003.Google ScholarGoogle Scholar
  9. Michael M. Swift, Brian N. Bershad, and Henry M. Levy. Improving the reliability of commodity operating systems. In Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 207--222. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Victor L. Voydock and Stephen T. Kent. Security mechanisms in high-level network protocols. ACM Comput. Surv., 15(2):135--171, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Andrew Whitaker, Marianne Shaw, and Steven D. Gribble. Scale and performance in the Denali isolation kernel. In Proceedings of the fifth symposium on Operating systems design and implementation, pages 195--209. USENIX Association, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          EW 11: Proceedings of the 11th workshop on ACM SIGOPS European workshop
          September 2004
          214 pages
          ISBN:9781450378079
          DOI:10.1145/1133572

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 September 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          EW 11 Paper Acceptance Rate37of37submissions,100%Overall Acceptance Rate37of37submissions,100%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader