期刊文献+

一种利用EPT机制的动态物理内存隔离方法

Dynamic Physical Memory Isolation Method Using EPT Mechanism
下载PDF
导出
摘要 传统的物理内存保护机制主要依赖具体硬件和操作系统实现,存在可靠性低、隔离性差、安全性弱等缺点.Intel VT的VM X架构通过引入扩展页表(Extended Page Table,EPT)机制实现对物理内存的访问控制.在深入分析EPT实现原理的基础上,设计了一种动态物理内存隔离与访问验证方法,并设计了原型系统PMM (Physical Memory Monitor),该系统能够隐藏Linux操作系统应用程序进程访问的物理内存.在Linux操作系统上进行了原型实现和验证,实验结果表明,该方法能够隐藏应用程序进程访问的物理内存,防止应用程序的物理内存隐私数据和功能代码被非法访问和篡改,并且带来较少的性能开销. Traditional physical memory protection mechanism mainly depends on the specific hardware and operation system,which has disadvantage including low reliability,bad isolation and weak security and so on. VMX architecture of Intel VT realizes controlling operation system users to access the physical memory. On the basis of analysis of EPT implementation principle,designed method of physical memory dynamic isolation and access simulation,then implemented prototype system PMM( Physical Memory Monitor),which used EPT mechanism to hide physical memory accessed by Linux application program process. The experiment results shows that this method can hide physical memory accessed by application program process and prevent illegal program from accessing protected physical memory and produce less performance cost.
作者 孔维亮 滕俊章 薛猛 KONG Wei-liang;TENG Jun-zhang;XUE Meng(32753 Unit,Wuhan 430000,China;78123 Unit,Chengdu 610000,China)
机构地区 [ [
出处 《小型微型计算机系统》 CSCD 北大核心 2021年第12期2654-2659,共6页 Journal of Chinese Computer Systems
基金 “核高基”国家科技重大专项项目(2013JH00103)资助。
关键词 扩展页表 访问控制 动态物理内存隔离 EPT access control dynamicphysical memory isolation
  • 相关文献

参考文献6

二级参考文献44

  • 1Suh D,Clarke B,Gassend M,et al.Efficient memory integrity verification and encryption for secure processors[C]//Proc of the 36th International Symposium on Microarchitecture.2003:339-350.
  • 2Shi W,Lee H H,Ghosh M,et al.High efficiency counter mode security architecture via prediction and precomputation[C]//Proc of the 32nd International Symposium on Computer Architecture.2005:14-24.
  • 3Lee R B,Kwan P C,Mcgregor J P,et al.Architecture for protecting critical secrets in microporcessors[C]//Proc of International Symposium on Computer Architecture.2005:2-13.
  • 4Yan C,Rogers B,Englender D,et al.Improving cost,performance,and security of memory encryption and authentication[C]//Proc of the 33rd Annual International Symposium on Computer Architecture.2006:179-190.
  • 5Huang R,Den D Y,Suh G E.ORTHRUS:efficient software integrity protection on multi-cores[C]//Proc of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems.2010:371-383.
  • 6Lee M,Ahn M,Kim E.I2SEMS:interconnects-independent security enhanced shared memory multiprocessor systems[C]//Proc of International Conference on Parallel Architectures and Compilation Techniques.2007:94-103.
  • 7Rogers B,Yan Chenyu,Chhabra S,et al.Single-level integrity and confidentiality protection for distributed shared memory multiprocessors[C]//Proc of International Symposium on Computer Architecture.2008:161-172.
  • 8Henson M,Taylor S.Memory encryption:a survey of existing techniques[J].ACM Computing Surveys,2014,46(4):1-26.
  • 9Chen Long,Zhang Zhao.MemGuard:a low cost and energy efficient design to support and enhance memory system reliability[C]//Proc of the 41st Annual International Symposium on Computer Architecuture.2014:49-60.
  • 10Lu C,Zhang T,Shi W,et al.M-Tree:a high efficiency security architecture for protecting integrity and privacy of software[J].Journal of Parallel and Distributed Computing,2006,66(9):1116-1128.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部