【24h】

Device Driver Safety Through a Reference Validation Mechanism

机译:通过参考验证机制的设备驱动程序安全

获取原文
获取原文并翻译 | 示例

摘要

Device drivers typically execute in supervisor mode and thus must be fully trusted. This paper describes how to move them out of the trusted computing base, by running them without supervisor privileges and constraining their interactions with hardware devices. An implementation of this approach in the Nexus operating system executes drivers in user space, leveraging hardware isolation and checking their behavior against a safety specification. These Nexus drivers have performance comparable to in-kernel, trusted drivers, with a level of CPU overhead acceptable for most applications. For example, the monitored driver for an Intel el000 Ethernet card has throughput comparable to a trusted driver for the same hardware under Linux. And a monitored driver for the Intel i810 sound card provides continuous playback. Drivers for a disk and a USB mouse have also been moved successfully to operate in user space with safety specifications.
机译:设备驱动程序通常在超级用户模式下执行,因此必须得到完全信任。本文介绍了如何通过在没有管理员权限的情况下运行它们并限制它们与硬件设备的交互,从而将它们从受信任的计算基础中移出。 Nexus操作系统中此方法的实现在用户空间中执行驱动程序,利用硬件隔离并根据安全规范检查其行为。这些Nexus驱动程序的性能可与内核内受信任的驱动程序媲美,并且大多数应用程序可接受的CPU开销水平。例如,用于Intel el000以太网卡的受监控驱动程序的吞吐量与Linux下相同硬件的受信任驱动程序相当。英特尔i810声卡的受监视驱动程序可提供连续播放。磁盘和USB鼠标的驱动程序也已成功移动,可以在具有安全规范的用户空间中运行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号