Innovations and applications of operating system security with a hardware-software co-design

被引:0
|
作者
Gu, Jinyu [1 ,2 ]
Hua, Zhichao [1 ,2 ]
Li, Mingyu [1 ,2 ]
Chen, Haibo [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] Minist Educ, Engn Res Ctr Domain Specif Operating Syst, Shanghai 200240, Peoples R China
来源
CHINESE SCIENCE BULLETIN-CHINESE | 2022年 / 67卷 / 32期
关键词
operating system security; trusted execution environment security; virtualization security; kernel security; application system security;
D O I
10.1360/TB-2022-0557
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The operating system is the foundation and core support technology of modern computing platforms, responsible for managing hardware resources, controlling the operation of programs, improving the human-machine interface and providing support for application software. Its connotation and extension are constantly expanding with the development of applications and hardware. The scientific aspects of operating systems fall into two categories: The first is the efficient abstraction and management of physical resources; the second is the provision of an efficient operating environment for applications. In the last decade and the period ahead, the specific connotation of the scientific problem is how to provide efficient abstraction and management of physical resources such as heterogeneous cores and data centers, to create efficient operating environments to support application scenarios such as cloud computing, big data and the Internet of Things. Because of the importance of the operating system, the security capability of the operating system is critical to the security of the entire system. The security of the operating system is the security pillar in mobile platforms or cloud platforms. Similarly, in many emerging scenarios, such as the industrial internet, smart networked cars and serverless computing, computer systems' security is related to data and property security, and possibly production and life safety. Therefore, the need to enhance the security capability of the operating system against software and hardware attacks remains urgent in the face of various security threats and multi-dimensional security vulnerabilities. It requires the design of system software to take into account chip TEE security, virtualization security, system kernel security, and application system security. This paper presents our team's work on the innovation and application of operating system security from the above aspects. Specifically, in the aspect of TEE on-chip, we propose Penglai that can offer trusted execution environments for securitysensitive computation. Penglai is built over the emerging RISC-V architecture and its core feature is scalability in both memory capacity and performance. In the aspect of virtualization security, we design CloudVisor which introduces a new system architecture for the virtualization software stack. CloudVisor can offer the abstraction of secure VM against curious or malicious hypervisor and cloud providers. In the aspect of kernel security, we build ChCore which uses the microkernel design and introduces some new mechanisms for reliability. As a microkernel OS, ChCore can greatly mitigate the consequences of security vulnerabilities and it can also work as an TEE OS to cooperate with the TEE hardware technologies. In the aspect of application system security, we propose PiXiu which can provide security guarantee for distributed applications. PiXiu targets on securing sensitive computation, especially for the distributed computation, and it assumes a powerful attack model. Overall, all of the above-introduced research adopt the hardware-software co-designs, and they can fuse with each other to offer a full-stack security system. Meanwhile, the paper will also provide an overview of the representative academic work in each aspect, which includes the comparison of different technical contributations.
引用
收藏
页码:3861 / 3871
页数:10
相关论文
共 41 条
  • [1] [Anonymous], 2012, P 3 ACM S CLOUD COMP
  • [2] Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
    Azab, Ahmed M.
    Ning, Peng
    Shah, Jitesh
    Chen, Quan
    Bhutkar, Rohan
    Ganesh, Guruprasad
    Ma, Jia
    Shen, Wenbo
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 90 - 102
  • [3] Bahmani R, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P1073
  • [4] Boyd-Wickizer S., 2010, P 2010 USENIX C USEN, P9
  • [5] Butt S., 2012, P 2012 ACM C COMPUTE, P253
  • [6] Chen H B, 2020, MODERN OPERATING SYS
  • [7] Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
    Cheng, Raymond
    Zhang, Fan
    Kos, Jernej
    He, Warren
    Hynes, Nicholas
    Johnson, Noah
    Juels, Ari
    Miller, Andrew
    Song, Dawn
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 185 - 200
  • [8] Costan V, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P857
  • [9] Dautenhahn N, 2015, ACM SIGPLAN NOTICES, V50, P191, DOI [10.1145/2775054.2694386, 10.1145/2694344.2694386]
  • [10] ATOM: Efficient Tracking, Monitoring, and Orchestration of Cloud Resources
    Du, Min
    Li, Feifei
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2017, 28 (08) : 2172 - 2189