Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Secure Memory Management on Modern Hardware (2009.02737v1)

Published 6 Sep 2020 in cs.OS

Abstract: Almost all modern hardware, from phone SoCs to high-end servers with accelerators, contain memory translation and protection hardware like IOMMUs, firewalls, and lookup tables which make it impossible to reason about, and enforce protection and isolation based solely on the processor's MMUs. This has led to numerous bugs and security vulnerabilities in today's system software. In this paper we regain the ability to reason about and enforce access control using the proven concept of a reference monitor mediating accesses to memory resources. We present a fine-grained, realistic memory protection model that makes this traditional concept applicable today, and bring system software in line with the complexity of modern, heterogeneous hardware. Our design is applicable to any operating system, regardless of architecture. We show that it not only enforces the integrity properties of a system, but does so with no inherent performance overhead and it is even amenable to automation through code generation from trusted hardware specifications.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Reto Achermann (8 papers)
  2. Nora Hossle (2 papers)
  3. Lukas Humbel (6 papers)
  4. Daniel Schwyn (3 papers)
  5. David Cock (7 papers)
  6. Timothy Roscoe (13 papers)
Citations (1)

Summary

We haven't generated a summary for this paper yet.