HPCA - 16 2010 the Sixteenth International Symposium on High-Performance Computer Architecture 2010
DOI: 10.1109/hpca.2010.5416657
|View full text |Cite
|
Sign up to set email alerts
|

Scalable architectural support for trusted software

Abstract: We present Bastion, a new hardware-software architecture for protecting security-critical software modules in an untrusted software stack. Our architecture is composed of enhanced microprocessor hardware and enhanced hypervisor software. Each trusted software module is provided with a secure, fine-grained memory compartment and its own secure persistent storage area. Bastion is the first architecture to provide direct hardware protection of the hypervisor from both software and physical attacks, before employi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
115
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 144 publications
(117 citation statements)
references
References 24 publications
(39 reference statements)
2
115
0
Order By: Relevance
“…This is consistent with the assumptions made by recent works such as HyperWall [53] and H-SVM [48]. We also note that if the physical memory is assumed to be untrusted, our proposal can be adjusted to that threat model by adding well-known techniques for memory integrity verification and encryption [51,8,10] to our design.…”
Section: Threat Model and Assumptionssupporting
confidence: 66%
See 1 more Smart Citation
“…This is consistent with the assumptions made by recent works such as HyperWall [53] and H-SVM [48]. We also note that if the physical memory is assumed to be untrusted, our proposal can be adjusted to that threat model by adding well-known techniques for memory integrity verification and encryption [51,8,10] to our design.…”
Section: Threat Model and Assumptionssupporting
confidence: 66%
“…NIMP, in contrast, does not rely on any software layers to be secure. Bastion [8] provides hardware-supported compartments to support secure execution environment for software modules. However, Bastion still relies on the security of the modified hypervisor to accomplish these goals.…”
Section: Hardware-supported Approachesmentioning
confidence: 99%
“…Another approach is to employ some existing hardware-assisted isolated execution solutions such as Iso-X [27] or Bastion [33]. This approach has two advantages.…”
Section: Smc Allocationmentioning
confidence: 99%
“…Relying on a permanent private key inside the processor simply restricts the portability of trust from one device to another. Secret-Protected (SP) architecture [26] and Bastion [33] focus on the management of keys. They…”
Section: Secure Processormentioning
confidence: 99%
See 1 more Smart Citation