TrustGraph: Trusted graphics subsystem for high assurance systems

6Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

High assurance MILS and MLS systems require strict limitation of the interactions between different security compartments based on a security policy. Virtualization can be used to provide a high degree of separation in such systems. Even with perfect isolation, however, the I/O devices are shared between different security compartments. Among the I/O controllers, the graphics subsystem is the largest and the most complex. This paper describes the design and implementation of TrustGraph, a trusted graphics subsystem for high assurance systems. First, we explain the threats and attacks possible against an unsecured graphics subsystem. We then describe the design of TrustGraph, the security principles it is built upon, and its implementation. Finally, we verify our implementation through different levels of verification which include functionality testing for simple operations, attack testing for security mechanisms, and formal verification for the critical components of the implementation. An analysis of the graphics API covert channel attack is presented, its channel capacity is measured, and the capacity is reduced using the idea of fuzzy time. © 2009 IEEE.

Cite

CITATION STYLE

APA

Okhravi, H., & Nicol, D. M. (2009). TrustGraph: Trusted graphics subsystem for high assurance systems. In Proceedings - Annual Computer Security Applications Conference, ACSAC (pp. 254–265). https://doi.org/10.1109/ACSAC.2009.31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free