首页> 外文期刊>Operating systems review >Implementing an Untrusted Operating System on Trusted Hardware
【24h】

Implementing an Untrusted Operating System on Trusted Hardware

机译:在受信任的硬件上实施不受信任的操作系统

获取原文
获取原文并翻译 | 示例
           

摘要

Recently, there has been considerable interest in providing "trusted computing platforms" using hardware ― TCPA and Palladium being the most publicly visible examples. In this paper we discuss our experience with building such a platform using a traditional time-sharing operating system executing on XOM ― a processor architecture that provides copy protection and tarnper-resistance functions. In XOM, only the processor is trusted; main memory and the operating system are not trusted. Our operating system (XOMOS) manages hardware resources for applications that don't trust it. This requires a division of responsibilities between the operating system and hardware that is unlike previous systems. We describe techniques for providing traditional operating systems services in this context. Since an implementation of a XOM processor does not exist, we use SimOS to simulate the hardware. We modify IRIX 6.5, a commercially available operating system to create XOMOS. We are then able to analyze the performance and implementation overheads of running an untrusted operating system on trusted hardware.
机译:最近,人们对使用硬件提供“可信计算平台”产生了浓厚的兴趣,TCPA和钯金是最公开的示例。在本文中,我们讨论了使用在XOM上执行的传统分时操作系统构建这样一个平台的经验,XOM是一种提供复制保护和防盗功能的处理器体系结构。在XOM中,只有处理器是受信任的。主内存和操作系统不受信任。我们的操作系统(XOMOS)为不信任它的应用程序管理硬件资源。这需要在操作系统和硬件之间划分职责,这不同于以前的系统。我们描述了在这种情况下提供传统操作系统服务的技术。由于不存在XOM处理器的实现,因此我们使用SimOS来仿真硬件。我们修改了IRIX 6.5(一种商业上可用的操作系统)来创建XOMOS。然后,我们能够分析在受信任的硬件上运行不受信任的操作系统的性能和实现开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号