skip to main content
10.1145/1519130.1519135acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Taming subsystems: capabilities as universal resource access control in L4

Published:31 March 2009Publication History

ABSTRACT

The embedded and mobile computing market with its wide range of innovations is expected to remain growing in the foreseeable future. Recent developments in the embedded computing technology offer more performance thereby facilitating applications of unprecedented utility. Open systems, such as Linux, provide access to a huge software base. Nevertheless, these systems have to coexist with critical device infrastructure that insists on stringent timing and security properties. In this paper, we will present a capability-based software architecture, featuring enforceable security policies. The architecture aims to support current and future requirements of embedded computing systems, such as running versatile third-party applications on general purpose and open operating systems side by side with security sensitive programs.

References

  1. Fiasco website. URL: http://os.inf.tu-dresden.de/fiasco/.Google ScholarGoogle Scholar
  2. L4 Environment website. URL: http://os.inf.tu-dresden.de/14env/.Google ScholarGoogle Scholar
  3. L4Linux website. URL: http://os.inf.tu-dresden.de/L4/LinuxOnL4/.Google ScholarGoogle Scholar
  4. M. J. Accetta, R. V. Baron, W. Bolosky, D. B. Golub, R. F. Rashid, A. Tevanian, and M. W. Young. Mach: A new kernel foundation for unix development. In USENIX Summer Conference, pages 93--113, Atlanta, GA, June 1986.Google ScholarGoogle Scholar
  5. J. Brakensiek, A. Dröge, H. Härtig, A. Lackorzynski, and M. Botteck. Virtualization as an enabler for security in mobile devices. In Proceedings of the First Workshop on Isolation and Integration in Embedded Systems (IIES 2008), EuroSys 2008 Affiliated Workshop, pages 17--22, Glasgow, Scotland, UK, April 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. In SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles, pages 73--88, New York, NY, USA, 2001. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. U. Dannowski, J. LeVasseur, E. Skoglund, and V. Uhlig. L4 experimental kernel reference manual, version x.2. Technical report, University of Karlsruhe, 2004. Latest version available from: http://14hq.org/docs/manuals/.Google ScholarGoogle Scholar
  8. Dhammika Elkaduwe, Kevin Elphinstone and Philip Derrin. Kernel design for isolation and assurance of physical memory. In Proceedings of the First Workshop on Isolation and Integration in Embedded Systems (IIES 2008), EuroSys 2008 Affiliated Workshop, Glasgow, Scotland, UK, April 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Elkaduwe, P. Derrin, and K. Elphinstone. Kernel data -- first class citizens of the system. In Proceedings of the 2nd International Workshop on Object Systems and Software Architectures, pages 39--43, Victor Harbor, South Australia, Australia, Jan 2006.Google ScholarGoogle Scholar
  10. N. Feske and H. Härtig. Demonstration of DOpE --- a Window Server for Real-Time and Embedded Systems. In 24th IEEE Real-Time Systems Symposium (RTSS), pages 74--77, Cancun, Mexico, Dec. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Kauer. L4.sec Implementation - Kernel Memory Managment. Master's thesis, TU Dresden, May 2005.Google ScholarGoogle Scholar
  12. J. Liedtke. On μ-kernel construction. In Proceedings of the 15th ACM Symposium on Operating System Principles (SOSP), pages 237--250, Copper Mountain Resort, CO, Dec. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Liedtke. L4 reference manual (486, Pentium, PPro). Arbeitspapiere der GMD No. 1021, GMD --- German National Research Center for Information Technology, Sankt Augustin, Sept. 1996. Also Research Report RC 20549, IBM T. J. Watson Research Center, Yorktown Heights, NY, September 1996.Google ScholarGoogle Scholar
  14. J. Liedtke. L4 nucleus version x reference manual (x86). Technical report, University of Karlsruhe, Sept. 1999.Google ScholarGoogle Scholar
  15. J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: an execution infrastructure for tcb minimization. In Eurosys '08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, pages 315--328, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. S. Miller, K.-P. Yee, and J. Shapiro. Capability Myths Demolished. Technical report, 2003.Google ScholarGoogle Scholar
  17. J. S. Shapiro, J. M. Smith, and D. J. Farber. Eros: a fast capability system. In In Symposium on Operating Systems Principles, pages 170--185, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: three case studies. SIGOPS Oper. Syst. Rev., 40(4):161--174, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. Weinhold and H. Härtig. VPFS: building a virtual private file system with a small trusted computing base. SIGOPS Oper. Syst. Rev., 42(4):81--93, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Taming subsystems: capabilities as universal resource access control in L4

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IIES '09: Proceedings of the Second Workshop on Isolation and Integration in Embedded Systems
      March 2009
      45 pages
      ISBN:9781605584645
      DOI:10.1145/1519130

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 March 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader