Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Secure I/O on trusted platforms with lightweight kernels.

Gordon, Nicholas (2025) Secure I/O on trusted platforms with lightweight kernels. Doctoral Dissertation, University of Pittsburgh. (Unpublished)

[img]
Preview
PDF (Final Submission)
Primary Text

Download (1MB) | Preview

Abstract

Trusted computing has become widespread and the complexity of trusted applications has increased substantially, such as in real-time patient vitals data processing or employee- free stores that continuously monitor customers. These applications differ from existing trusted computing usage in that they directly acquire and process sensitive information from sensors like cameras and microphones. Simultaneously, application demands are ex- panding to include a rich, general-purpose OS environment to provide network, filesystems, and multicomputing capabilities. An application runtime of similar capability approaches an OS in terms of complexity and would require extensive interfacing with the underlying untrusted OS anyway, so we claim that a full-stack trusted OS provides similar capabilities with a smaller, less complex trust profile. Further, current trusted OSes fail to provide this environment because they are designed to provide trusted services to untrusted applications, and the use of full-weight kernels (FWKs) like Linux is ruled out due to security concerns. We aim to solve this problem by using lightweight kernels (LWK), which strike the correct balance between security and usability and can fully exploit hardware to provide secure device I/O. Lightweight kernels are an OS design approach that presents a familiar programming environment to Linux both in userspace and in the kernel, allowing many applications to run without modification, as well as ease porting of existing device drivers. Further, hardware is more directly exposed to programmers–that is, with fewer hardware abstraction layers– enabling easy leveraging of platform hardware and peripherals. To demonstrate these design advantages we develop a LWK trusted OS for the ARM TrustZone environment on a typical IoT or edge computing hardware platform. Specifically, we extend the Kitten LWK to be TrustZone-aware, develop an I/O stack to demonstrate the viability of a camera driver, and then build a framework for securely paravirtualizing existing Linux drivers by using recent, modern TrustZone hardware.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: University of Pittsburgh ETD
Status: Unpublished
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Gordon, Nicholasnig49@pitt.edunig490000-0002-4878-9827
ETD Committee:
TitleMemberEmail AddressPitt UsernameORCID
Committee ChairLange, Johnjacklange@cs.pitt.edujlange
Committee MemberLee, Adamadamlee@pitt.eduadamlee
Committee MemberBabay, Amybabay@pitt.edubabay
Committee MemberTiwari, Deveshd.tiwari@northeastern.edu
Date: 7 January 2025
Date Type: Publication
Defense Date: 8 August 2024
Approval Date: 7 January 2025
Submission Date: 30 August 2024
Access Restriction: No restriction; Release the ETD for access worldwide immediately.
Number of Pages: 107
Institution: University of Pittsburgh
Schools and Programs: School of Computing and Information > Computer Science
Degree: PhD - Doctor of Philosophy
Thesis Type: Doctoral Dissertation
Refereed: Yes
Uncontrolled Keywords: operating systems, multikernel, security, edge, IoT, partitioning
Date Deposited: 07 Jan 2025 19:34
Last Modified: 07 Jan 2025 19:34
URI: http://d-scholarship.pitt.edu/id/eprint/46961

Metrics

Monthly Views for the past 3 years

Plum Analytics


Actions (login required)

View Item View Item