首页> 外文OA文献 >Tolerating Malicious Device Drivers in Linux
【2h】

Tolerating Malicious Device Drivers in Linux

机译:容忍Linux中的恶意设备驱动程序

摘要

This paper presents SUD, a system for running existingLinux device drivers as untrusted user-space processes.Even if the device driver is controlled by a maliciousadversary, it cannot compromise the rest of the system.One significant challenge of fully isolating a driver is toconfine the actions of its hardware device. SUD relies onIOMMU hardware, PCI express bridges, and message-signaledinterrupts to confine hardware devices. SUDruns unmodified Linux device drivers, by emulating aLinux kernel environment in user-space. A prototype ofSUD runs drivers for Gigabit Ethernet, 802.11 wireless,sound cards, USB host controllers, and USB devices, andit is easy to add a new device class. SUD achieves thesame performance as an in-kernel driver on networkingbenchmarks, and can saturate a Gigabit Ethernet link.SUD incurs a CPU overhead comparable to existing runtimedriver isolation techniques, while providing muchstronger isolation guarantees for untrusted drivers. Finally,SUD requires minimal changes to the kernel—just twokernel modules comprising 4,000 lines of code—whichmay at last allow the adoption of these ideas in practice.
机译:本文介绍了SUD,一种用于将现有Linux设备驱动程序作为不受信任的用户空间进程运行的系统,即使该设备驱动程序是由恶意对手控制的,也无法破坏系统的其余部分。其硬件设备的动作。 SUD依赖IOMMU硬件,PCI Express桥和消息信号中断来限制硬件设备。 SUD通过在用户空间中模拟Linux内核环境来运行未修改的Linux设备驱动程序。 SUD的原型运行用于千兆以太网,802.11无线,声卡,USB主机控制器和USB设备的驱动程序,并且很容易添加新的设备类。 SUD与网络基准上的内核驱动程序具有相同的性能,并且可以使千兆以太网链接饱和。SUD产生的CPU开销可与现有的运行时驱动程序隔离技术相提并论,同时为不受信任的驱动程序提供了更强大的隔离保证。最后,SUD只需对内核进行最少的更改(仅需两个内核模块即可组成4,000行代码),这最终可以在实践中采用这些思想。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号