Trusted Display on Untrusted Commodity Platforms. Yu, M., Gligor, V., D., & Zhou, Z. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), of CCS '15, pages 989-1003, 10, 2015. ACM.
Trusted Display on Untrusted Commodity Platforms [link]Website  abstract   bibtex   
A trusted display service assures the confidentiality and authenticity of content output by a security-sensitive application and thus prevents a compromised commodity operating system or application from surreptitiously reading or modifying the displayed output. Past approaches have failed to provide trusted display on commodity platforms that use modern graphics processing units (GPUs). For example, full GPU virtualization encourages the sharing of GPU address space with multiple virtual machines \\em without providing adequate hardware protection mechanisms; e.g., address-space separation and instruction execution control. This paper proposes a new trusted display service that has a minimal trusted code base and maintains full compatibility with commodity computing platforms. The service relies on a GPU separation kernel that (1) defines different types of GPU objects, (2) mediates access to security-sensitive objects, and (3) emulates object whenever required by commodity-platform compatibility. The separation kernel employs a new address-space separation mechanism that avoids the challenging problem of GPU instruction verification without adequate hardware support. The implementation of the trusted-display service has a code base that is two orders of magnitude smaller than other similar services, such as those based on full GPU virtualization. Performance measurements show that the trusted-display overhead added over and above that of the underlying trusted system is fairly modest.
@inProceedings{
 title = {Trusted Display on Untrusted Commodity Platforms},
 type = {inProceedings},
 year = {2015},
 identifiers = {[object Object]},
 keywords = {display,trusted,trusted-io},
 pages = {989-1003},
 websites = {http://doi.acm.org/10.1145/2810103.2813719},
 month = {10},
 publisher = {ACM},
 city = {New York, NY, USA},
 series = {CCS '15},
 id = {e12f4fbe-25e1-31b4-b4cd-3ed36aa0b1fe},
 created = {2018-07-12T21:32:05.202Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:32:05.202Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {yu:trusted15},
 source_type = {inproceedings},
 private_publication = {false},
 abstract = {A trusted display service assures the confidentiality and authenticity of content output by a security-sensitive application and thus prevents a compromised commodity operating system or application from surreptitiously reading or modifying the displayed output. Past approaches have failed to provide trusted display on commodity platforms that use modern graphics processing units (GPUs). For example, full GPU virtualization encourages the sharing of GPU address space with multiple virtual machines \\em without providing adequate hardware protection mechanisms; e.g., address-space separation and instruction execution control. This paper proposes a new trusted display service that has a minimal trusted code base and maintains full compatibility with commodity computing platforms. The service relies on a GPU separation kernel that (1) defines different types of GPU objects, (2) mediates access to security-sensitive objects, and (3) emulates object whenever required by commodity-platform compatibility. The separation kernel employs a new address-space separation mechanism that avoids the challenging problem of GPU instruction verification without adequate hardware support. The implementation of the trusted-display service has a code base that is two orders of magnitude smaller than other similar services, such as those based on full GPU virtualization. Performance measurements show that the trusted-display overhead added over and above that of the underlying trusted system is fairly modest.},
 bibtype = {inProceedings},
 author = {Yu, Miao and Gligor, Virgil D and Zhou, Zongwei},
 booktitle = {Proceedings of the ACM Conference on Computer and Communications Security (CCS)}
}

Downloads: 0