首页> 外文会议>IEEE/ACM International Conference on Computer-Aided Design >Hardening extended memory access control schemes with self-verified address spaces
【24h】

Hardening extended memory access control schemes with self-verified address spaces

机译:具有自验证地址空间的硬化扩展内存访问控制方案

获取原文

摘要

In this paper we revisit the security properties of extended access control schemes that are used to protect application secrets from untrusted system software. We demonstrate the vulnerability of several recent proposals to a class of attacks we call mapping attacks. We argue that protection from such attacks requires verification of the address space integrity and propose the concept of self-verified address spaces (SVAS), where the applications themselves are made aware of the requested changes in the page mappings and are placed in charge of verifying them. SVAS equips an application with a customized verification model with several attractive functional and performance properties. We implemented the attacks and a complete prototype of SVAS in Linux and the QEMU emulator. Our results demonstrate that SVAS can prevent mapping attacks on extended access control systems with minimal performance overhead, hardware modifications and software complexity.
机译:在本文中,我们重新审视扩展访问控制方案的安全性属性,用于保护来自不受信任的系统软件的应用程序秘密。我们展示了几个提案对一类我们呼叫映射攻击的攻击的脆弱性。我们认为,这种攻击的保护需要验证地址空间完整性,并提出自验证地址空间(SVAS)的概念,其中应用程序本身是否了解页面映射中的所请求的更改,并被负责验证。他们。 SVAS提供具有自定义验证模型的应用程序,具有几种有吸引力的功能和性能属性。我们在Linux和Qemu仿真器中实现了攻击和SVA的完整原型。我们的结果表明,SVA可以防止具有最小性能开销,硬件修改和软件复杂性的扩展访问控制系统上的映射攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号