[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1852666.1852760acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
poster

A conceptual model of self-monitoring multi-core systems

Published: 21 April 2010 Publication History

Abstract

The paper discusses a conceptual model of building a self-monitoring mechanism in a multi-core system such that the health of the entire system can be monitored securely and in an implicit manner. Accordingly, a many-core system is vertically partitioned (from hardware to application level) so that a small set of processors (security core) is separated from other user data processing cores to build a security subsystem. Then the model delegates security handling tasks to this isolated subsystem and uses a set of privileged instructions to monitor the other part (user side) and interact using a secure message exchange protocol. Simulation of the proposed security mechanism using several off-the-shelf software tools will be performed in order to demonstrate the proof-of-concept.

References

[1]
Cpuset Manual. Linux Programmer's Manual: http://www.kernel.org/doc/man-pages/online/pages/man7/cpuset.7.html
[2]
Dataram's RAMDisk: http://memory.dataram.com/products-and-services/software/ramdisk
[3]
Kaspersky Labs Business News: http://www.kaspersky.com/news?id=207576021 (accessed on March 13, 2010)
[4]
M. Rosenblum and T. Garfinkel. Virtual machine monitors: Current technology and future trends. In IEEE Computer Magazine, May 2005.
[5]
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, and R. Neugebauer, I. Pratt and A. Warfield. Xen and the art of virtualization. In Proceedings of the nineteenth ACM symposium on Operating systems principles, 2003.
[6]
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. V. Doorn, J. L. Griffin and S. Berger. SHype: Secure Hypervisor Approach to Trusted Virtualized Systems. IBM Research Report, RC23511 (W0502-006), February 2, 2005.
[7]
INTEGRITY Multivisor, Green Hills Software at www.ghs.com.
[8]
J. M. McCune, B. Parno, A. Perrig, M. Reiter, A. Seshadri. How Low Can You Go? Recommendations for Hardware-Supported Minimal TCB Code Execution. In ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2008.
[9]
X. Zhang, Y. Xie, X. Lai, S. Zhang and Z. Deng. A Multi-core Security Architecture Based on EFI, In Lecture Notes in Computer Science, Volume 4804, Springer Book Series, 2009.
[10]
A. Baumann, P. Barham, P-E Dagand, T. Harris, R. Isaacs, S. Peter, T. Roscoe, A. Schüpbach, and A. Singhania. The Multikernel: A new OS architecture for scalable multicore systems. In the proceedings of 22nd Symposium on Operating Systems Principles (SOSP), October 11--14, 2009.
[11]
N. Aggarwal, P. Ranganathan, N. P. Jouppi, J. E. Smith. Configurable isolation: building high availability systems with commodity multi-core processors. In ACM Proceedings of the 34th annual international symposium on Computer architecture (ISCA), June 9--13, 2007
[12]
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. Proc. In Network and Distributed Systems Security Symposium. Pages: 253--285. 2003.
[13]
Vmware: Virtual-machine exploit lets attackers take over host. http://news.zdnet.co.uk/security/0,1000000189,39661637,00.htm (accessed on March 13, 2010)
[14]
V. D. Gligor. A guide to understanding covert channel analysis of trusted systems. Technical report, National Computer Security Center, November 1993.
[15]
J. Kirch. Virtual Machine Security Guidelines. The Center for Internet Security, September 2007.
[16]
J. S. Reuben. A survey on virtual machine security. Technical report, Helsinki University of Technology, October 2007.

Cited By

View all
  • (2010)Configurable and Secure System ArchitecturesProceedings of the 2010 Second Vaagdevi International Conference on Information Technology for Real World Problems10.1109/VCON.2010.18(57-62)Online publication date: 9-Dec-2010

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
April 2010
257 pages
ISBN:9781450300179
DOI:10.1145/1852666
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. dedicated security core
  2. multi-core system
  3. resource partitioning
  4. self-monitoring system
  5. virtual machine monitors

Qualifiers

  • Poster

Conference

CSIIRW '10

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2010)Configurable and Secure System ArchitecturesProceedings of the 2010 Second Vaagdevi International Conference on Information Technology for Real World Problems10.1109/VCON.2010.18(57-62)Online publication date: 9-Dec-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media