加固跨域应用容器

Jason Dahlstrom, Jim Brock, Mekedem Tenaw, M. Shaver, Stephen Taylor
{"title":"加固跨域应用容器","authors":"Jason Dahlstrom, Jim Brock, Mekedem Tenaw, M. Shaver, Stephen Taylor","doi":"10.1109/MILCOM47813.2019.9020992","DOIUrl":null,"url":null,"abstract":"Cross-domain platforms control the sharing of information at multiple classification levels. For example, some cross-domain systems allow a single user to view multiple screens, at different security classification levels, on a single monitor. The core security guarantees rest on a base-of-trust in hardware established primarily through hypervisor technology. Unfortunately, over the years, hypervisors and their associated management interfaces have steadily grown in complexity, to the point where they now exceed the size of the operating system kernels they seek to protect. This has made it increasingly difficult to verify security properties in the face of kernel-level zero-day exploits and advanced persistent threats. At the same time, there has been a radical shift in computing methodology motivated by the realization that reliable deployment at scale requires an application to be associated with a specific operating system version with carefully designated libraries. This realization has resulted in an alternative computing paradigm ― containers - that wrap application attributes and execute through a shared kernel. This paper describes a novel embedded systems technology, the nano-marshal: a light-weight container system, compliant with the Open Containers Initiative (OCI), that supports cross-domain applications. The system permits container security to be hardened through innovative hardware mechanisms, hidden within Field Programmable Gate Arrays (FPGA's).","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Hardening Containers for Cross-Domain Applications\",\"authors\":\"Jason Dahlstrom, Jim Brock, Mekedem Tenaw, M. Shaver, Stephen Taylor\",\"doi\":\"10.1109/MILCOM47813.2019.9020992\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cross-domain platforms control the sharing of information at multiple classification levels. For example, some cross-domain systems allow a single user to view multiple screens, at different security classification levels, on a single monitor. The core security guarantees rest on a base-of-trust in hardware established primarily through hypervisor technology. Unfortunately, over the years, hypervisors and their associated management interfaces have steadily grown in complexity, to the point where they now exceed the size of the operating system kernels they seek to protect. This has made it increasingly difficult to verify security properties in the face of kernel-level zero-day exploits and advanced persistent threats. At the same time, there has been a radical shift in computing methodology motivated by the realization that reliable deployment at scale requires an application to be associated with a specific operating system version with carefully designated libraries. This realization has resulted in an alternative computing paradigm ― containers - that wrap application attributes and execute through a shared kernel. This paper describes a novel embedded systems technology, the nano-marshal: a light-weight container system, compliant with the Open Containers Initiative (OCI), that supports cross-domain applications. The system permits container security to be hardened through innovative hardware mechanisms, hidden within Field Programmable Gate Arrays (FPGA's).\",\"PeriodicalId\":371812,\"journal\":{\"name\":\"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM47813.2019.9020992\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM47813.2019.9020992","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

跨领域平台控制着多个分类级别的信息共享。例如,一些跨域系统允许单个用户在单个监视器上以不同的安全分类级别查看多个屏幕。核心安全保证依赖于主要通过管理程序技术建立的硬件信任基础。不幸的是,多年来,管理程序及其相关的管理接口的复杂性一直在稳步增长,现在已经超过了它们试图保护的操作系统内核的大小。这使得在面对内核级零日漏洞和高级持续性威胁时,验证安全属性变得越来越困难。同时,由于认识到可靠的大规模部署需要将应用程序与具有精心指定库的特定操作系统版本相关联,计算方法发生了根本性的转变。这种实现产生了另一种计算范式——容器——它包装应用程序属性并通过共享内核执行。本文描述了一种新的嵌入式系统技术,纳米元帅:一种轻量级容器系统,符合开放容器倡议(OCI),支持跨域应用。该系统允许通过隐藏在现场可编程门阵列(FPGA)中的创新硬件机制来加强容器的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Hardening Containers for Cross-Domain Applications
Cross-domain platforms control the sharing of information at multiple classification levels. For example, some cross-domain systems allow a single user to view multiple screens, at different security classification levels, on a single monitor. The core security guarantees rest on a base-of-trust in hardware established primarily through hypervisor technology. Unfortunately, over the years, hypervisors and their associated management interfaces have steadily grown in complexity, to the point where they now exceed the size of the operating system kernels they seek to protect. This has made it increasingly difficult to verify security properties in the face of kernel-level zero-day exploits and advanced persistent threats. At the same time, there has been a radical shift in computing methodology motivated by the realization that reliable deployment at scale requires an application to be associated with a specific operating system version with carefully designated libraries. This realization has resulted in an alternative computing paradigm ― containers - that wrap application attributes and execute through a shared kernel. This paper describes a novel embedded systems technology, the nano-marshal: a light-weight container system, compliant with the Open Containers Initiative (OCI), that supports cross-domain applications. The system permits container security to be hardened through innovative hardware mechanisms, hidden within Field Programmable Gate Arrays (FPGA's).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信