首页> 外文期刊>Future generation computer systems >iFlask: Isolate flask security system from dangerous execution environment by using ARM TrustZone
【24h】

iFlask: Isolate flask security system from dangerous execution environment by using ARM TrustZone

机译:IFLASK:使用ARM TrustZone将烧瓶安全系统从危险的执行环境中隔离

获取原文
获取原文并翻译 | 示例

摘要

Security is essential in mobile computing. And, therefore, various access control modules have been introduced. However, the complicated mobile runtime environment may directly impact on the integrity of these security modules, or even compels them to make wrong access control decisions. Therefore, for a trusted Flask based security system, it needs to be isolated from the dangerous mobile execution environment at runtime. In this paper, we propose an isolated Flask security architecture called iFlask to solve this problem for the Flask-based mandatory access control (MAC) system. iFlask puts its security server subsystem into the enclave provided by the ARM TrustZone so as to avert the negative impacts of the malicious environment. In the meanwhile, iFlask's object manager subsystems which run in the mobile system kernel use a built-in supplicant proxy to effectively lookup policy decisions made by the back-end security server residing in the enclave, and to enforce these rules on the system with trustworthy behaviors. Moreover, to protect iFlask's components which are not protected by the enclave, we not only provide an exception trap mechanism that enables TrustZone to enlarge its protection scope to protect selected memory regions from the malicious system, but also establish a secure communication channel to the enclave as well. The prototype is implemented on SELinux, which is the widely used Flask-based MAC system, and the base of SEAndroid. The experimental results show that SELinux receives reliable protection, because it resists all known vulnerabilities (e.g., CVE-2015-1815) and remains unaffected by the attacks in the test set. The propose architecture have very slight impact on the performance, it shows a performance degradation ranges between 0.53% to 6.49% compared to the naked system.
机译:安全性在移动计算中至关重要。因此,已经引入了各种访问控制模块。但是,复杂的移动运行时间环境可能会直接影响这些安全模块的完整性,甚至迫使它们制作错误的访问控制决策。因此,对于基于信任的烧瓶的安全系统,需要在运行时从危险移动执行环境中孤立。在本文中,我们提出了一种被称为Iflask的孤立的烧瓶安全架构,以解决基于烧瓶的强制访问控制(MAC)系统的这个问题。 Iflask将其安全服务器子系统放入由ARM TrustZone提供的飞机中,以避免恶意环境的负面影响。同时,在移动系统内核中运行的IFLask的Object Manager子系统使用内置的请求者代理,以有效地查找由驻留在Candave中的后端安全服务器所做的策略决策,并在具有可靠性的系统上强制执行这些规则行为。此外,要保护IFLask的组件,它不仅提供了异常陷阱机制,使Turnzone能够扩大其保护范围,以保护来自恶意系统的所选存储区,还可以将安全的通信通道建立到外壳也是。原型是在Selinux上实现的,这是广泛使用的基于烧瓶的MAC系统,以及肖斯德罗的基础。实验结果表明,Selinux接收了可靠的保护,因为它抵制了所有已知的漏洞(例如,CVE-2015-1815),并且仍未受到测试集中攻击的影响。提议的架构对性能影响非常略有影响,它显示出与裸体系统相比的性能下降范围0.53%至6.49%。

著录项

  • 来源
    《Future generation computer systems》 |2020年第8期|531-537|共7页
  • 作者

    Diming Zhang; Shaodi You;

  • 作者单位

    210023 Nanjing University Nanjing Jiangsu China 212003 Jiangsu University of Science and Technology Zhenjiang Jiangsu China;

    2601 Data61-CSIRO Australia 2601 Australian National University Australia;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    iFlask; TrustZone; Isolation;

    机译:Iflask;TrustZone;隔离;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号