On the effectiveness of virtualization based memory isolation on multicore platforms

Virtualization based memory isolation has beenwidely used as a security primitive in many security systems.This paper firstly provides an in-depth analysis of itseffectiveness in the multicore setting; a first in the literature.Our study reveals that memory isolation by itself is inadequatefor secur...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHAO, Siqi, DING, Xuhua
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2017
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3699
https://ink.library.smu.edu.sg/context/sis_research/article/4701/viewcontent/fimce_eurosp17__1_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Description
Summary:Virtualization based memory isolation has beenwidely used as a security primitive in many security systems.This paper firstly provides an in-depth analysis of itseffectiveness in the multicore setting; a first in the literature.Our study reveals that memory isolation by itself is inadequatefor security. Due to the fundamental design choices inhardware, it faces several challenging issues including pagetable maintenance, address mapping validation and threadidentification. As demonstrated by our attacks implementedon XMHF and BitVisor, these issues undermine the security ofmemory isolation. Next, we propose a new isolation approachthat is immune to the aforementioned problems. In our design,the hypervisor constructs a fully isolated micro computingenvironment (FIMCE) that exposes a minimal attack surfaceto an untrusted OS on a multicore platform. By virtue ofits architectural niche, FIMCE offers stronger assurance andgreater versatility than memory isolation. We have built aprototype of FIMCE and measured its performance. To showthe benefits of using FIMCE as a building block, we have alsoimplemented several practical applications which cannot besecurely realized by using memory isolation alone.