Guarded Execution of Privileged Code in the Guest

نویسندگان

  • Kyle C. Hale
  • Peter A. Dinda
چکیده

Allowing a guest to have direct, privileged access to hardware can enhance its performance and functionality. Privileged access to hardware and the VMM also enables and improves the performance of virtualization services by allowing portions of their implementations to be hoisted into the guest, even uncooperatively. However, granting such privilege currently requires that the entire guest be trusted. We present a software technique, guarded execution of privileged code, that allows the VMM to inject code modules into the guest that enjoy unrestrained access to specific hardware and VMM resources. Our system, which combines compile-time, link-time, and run-time techniques, provides the module developer with the guarantee that the module remains unmodified, and that it acquires privilege only when untrusted code invokes it through developer-chosen, valid entry points with a valid stack. An execution path leaving the module will then trigger a revocation of privilege. The system also provides the administrator with a secure method for binding a specific module with particular privileges implemented by the VMM. This lays the basis for guaranteeing that only trusted code in the guest can utilize special privileges. We give a motivating example by guarding the execution of a privileged, network interface driver in the form of a Linux module, such that it, and only it, has uninhibited access to the NIC hardware. This project is made possible by support from the United States National Science Foundation (NSF) via grant CNS-0709168, and the Department of Energy (DOE) via grant DE-SC0005343.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guarded Modules: Adaptively Extending the VMM's Privilege Into the Guest

When a virtual machine monitor (VMM) provides code that executes in the context of a guest operating system, allowing that code to have privileged access to specific hardware and VMM resources can enable new mechanisms to enhance functionality, performance, and adaptability. We present a software technique, guarded execution of privileged code in the guest, that allows the VMM to provide this c...

متن کامل

Guarded Modules: Adaptively Extending the VMM’s Privileges Into the Guest

Executing VMM-provided code with privileged access to specific hardware and VMM resources within an untrusted guest operating system can enable new mechanisms to enhance functionality, performance, and adaptability. We present a software technique, guarded execution of privileged code in the guest, that allows the VMM to provide this capability, as well as an implementation for Linux guests in ...

متن کامل

Static Analysis for Guarded Code

Guarded(predicated) execution, as a new hardware feature, has been introduced into today's high performance processors. Guarded execution can signiicantly improve the performance of programs with conditional branches, and meanwhile also poses new challenges for conventional program analysis techniques. In this paper, we propose a static semantics inference mechanism to capture the semantics inf...

متن کامل

Challenges arising from the conciseness of Islamic criminal law in the implementation of alternatives to imprisonment

  Due to the relatively emerging issue of alternatives to imprisonment, the Iranian judicial system has always faced various legal challenges, as the case may be, in the process of determining or implementing them. Authors with analytical and library method and with the knowledge of the wide range of legal challenges on the subject in terms of aspect and territory, only to a specific aspect an...

متن کامل

Guarded Execution and Branch Prediction in Dynamic ILP Processors†

In this paper we evaluate the effects of guarded (or conditional, or predicated) execution on the performance of an instruction level parallel processor employing dynamic branch prediction. First, we assess the utility of guarded execution, both qualitatively and quantitatively, using a variety of application programs. Our assessment shows that guarded execution significantly increases the oppo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013