首页> 外文会议>2019 56th ACM/IEEE Design Automation Conference >Revisiting the Arm Debug Facility for OS Kernel Security
【24h】

Revisiting the Arm Debug Facility for OS Kernel Security

机译:再次介绍用于操作系统内核安全性的Arm调试功能

获取原文
获取原文并翻译 | 示例

摘要

Hardware debugging facilities, such as watchpoints, have been used for software development and analysis. In this paper, we expanded the use of watchpoints as a hardware security primitive for enhancing the runtime security of mobile devices. By analyzing the watchpoints in detail, we derived useful watchpoint properties that can be exploited to build security applications. Based on our analysis, we designed example applications for hardening the OS kernel by exploiting watchpoints. The proposed applications were implemented on a Juno development board with 64-bit ARM architecture (ARMv8). Hardening the kernel by fully enabling the proposed schemes was found to impose reasonable overhead, i.e., 3% with SPEC CPU2006.
机译:硬件调试工具(例如观察点)已用于软件开发和分析。在本文中,我们扩展了监视点作为硬件安全性原语的用途,以增强移动设备的运行时安全性。通过详细分析观察点,我们得出了有用的观察点属性,可以利用这些属性来构建安全性应用程序。根据我们的分析,我们设计了一些示例应用程序,以通过利用观察点来强化OS内核。拟议的应用程序在具有64位ARM架构(ARMv8)的Juno开发板上实现。发现通过完全启用建议的方案来强化内核会带来合理的开销,即,使用SPEC CPU2006的开销为3%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号