The cake is a lie: Privilege rings as a policy resource

5Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Components of commodity OS kernels typically execute at the same privilege level. Consequently, the compromise of even a single component undermines the trustworthiness of the entire kernel and its ability to enforce separation between user-level processes. Reliably containing the extent of a compromised kernel component is a problem to which few practical solutions exist. While many approaches have been proposed to reduce the need to trust large portions of the kernel, most of these approaches represent exotic reorganizations of the hardware or OS kernel that are either not applicable to commodity systems or are relatively complex and difficult to debug in their own right (e.g., microkernels). We propose simple, natural modifications to commodity - x86 - hardware that enable vertical isolation down through the kernel without the use of virtualization or major OS rewrites; specifically, extending and reinterpreting the x86 segmentation mechanism, extending the existing Current Privilege Level and Descriptor Privilege Level fields. We believe our proposal is a compelling alternative to traditional virtualization because the hardware virtualizes permissions, not I/O. Copyright 2009 ACM.

Author supplied keywords

Cite

CITATION STYLE

APA

Bratus, S., Johnson, P. C., Ramaswamy, A., Smith, S. W., & Locasto, M. E. (2009). The cake is a lie: Privilege rings as a policy resource. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 33–37). https://doi.org/10.1145/1655148.1655154

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free