Download presentation
Presentation is loading. Please wait.
Published byBaldwin Gerald McGee Modified over 5 years ago
1
Virtual machine monitors & Secure operation
Implementing an Untrusted Operating System on Trusted Hardware David Lie, Chandramohan A. Thekkath, Mark Horowitz, SOSP 2003 Terra: A Virtual-Machine Based Platform for Trusted Computing Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh, SOSP 2003 19-Jun-19 CSE 542: Operating Systems
2
CSE 542: Operating Systems
Related technologies Main frames offered virtual machine abstraction On a single machine, behaves like many individual, dedicated machines by virtualizing the underlying resources E.g. vmware, jail abstraction in FreeBSD Hosting centers: Runs many different customers on the same nodes. Isolate each client from each other while allocating more resources as the need occurs Adaptive infrastructure (HP), autonomous computing (IBM), N1 (Sun) … 19-Jun-19 CSE 542: Operating Systems
3
CSE 542: Operating Systems
XOMOS Trusted processor, untrusted OS, external memory Use compartments to isolate Encryption (with keys inside the processor itself) to let processor access code/data Solve issues where the OS does not know the contents for traditional OS operations (restoring registers, paging, process creation, shared libraries etc.) 19-Jun-19 CSE 542: Operating Systems
4
CSE 542: Operating Systems
Terra VM based approach attestation: Certificate chains to “prove” whether we can trust the current software was not compromised Root secure: Even root cannot break basic privacy and isolation guarantees Trusted path: Provide trusted path from the user to the application 19-Jun-19 CSE 542: Operating Systems
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.