Firma: Disk-Based Foundations for Trusted Operating Systems
نویسندگان
چکیده
Secure boot mechanisms aim to provide guarantees of integrity of a system as it loads. It ensures that if a system is running, all of its process will satisfy integrity verification requirements. While secure boot has been available for a long time, it is not available in commodity systems due to the high cost of secure hardware. In this paper, we describe Firma, an architecture that provides secure boot functionality based on a storage root of trust. Unlike previous secure boot mechanisms, use of the disk can protect data secrecy by only releasing data to systems trusted not to leak data, while also providing data integrity through release to high integrity systems. We implement a prototype of Firma and show how it may be used to provide a trusted virtual machine monitor (TVMM) capable of supporting strong security guarantees for running VMs. Only minimal administration is required, and we detail the tasks necessary to support the architecture, showing new systems can be configured with a small number of automated steps. Our evaluation shows that Firma requires additional overhead of just over 1 second for the boot process.
منابع مشابه
Extended Role Based Access Control with Procedural Constraints for Trusted Operating Systems
The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the deficiency, access control systems do not efficiently limit attacks consist of ordinary operations. For trusted operating system developments, we extended RBAC and added negative procedural constraints to refu...
متن کاملSpf: Security Performance Flexibility Framework for Trusted Operating Systems
The rapid growth of networking, data sharing, and the Internet has made computer security an important part of computer research and development. A number of highly secure operating systems have been developed to handle the increasing need for security. These operating systems, typically called Trusted Operating Systems, offer a number of security mechanisms that can help protect information, m...
متن کاملTrusted-Computing Technologies for the Protection of Critical Information Systems
† This paper is an extended version of the paper by the same title that appeared in the proceedings of the CISIS’08 conference. Abstract: Information systems controlling critical infrastructures are vital elements of our modern society. Purely software-based protection techniques have demonstrated limits in fending off attacks and providing assurance of correct configuration. Trusted computing ...
متن کاملConfiguration and Scheduling Tools for Tsp Systems Based on Xtratum
Hypervisor is a promising technology to build partitioned systems. However, it has to be adapted and customized to the requirements of the target application. Hypervisors are small software layers which can be designed to meet real-time and security properties. Its correctness can be sufficient to ensure the security of the system as a whole or, at least, the security of a set of trusted partit...
متن کاملTrusted Disk Loading in the Emulab Network Testbed
Network testbeds like Emulab allocate physical computers to users for the duration of an experiment. During an experiment, a user has nearly unfettered access to the devices under his or her control. Thus, at the end of an experiment, an allocated computer can be in an arbitrary state. A testbed must reclaim devices and ensure they are properly configured for future experiments. This is particu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009