The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (2012)
San Francisco, CA USA
May 20, 2012 to May 23, 2012
ISSN: 1081-6011
ISBN: 978-0-7695-4681-0
pp: 616-630
J. Newsome , ECE Dept. & CyLab, Carnegie Mellon Univ., Pittsburgh, PA, USA
J. M. McCune , ECE Dept. & CyLab, Carnegie Mellon Univ., Pittsburgh, PA, USA
Zongwei Zhou , ECE Dept. & CyLab, Carnegie Mellon Univ., Pittsburgh, PA, USA
V. D. Gligor , ECE Dept. & CyLab, Carnegie Mellon Univ., Pittsburgh, PA, USA
ABSTRACT
A trusted path is a protected channel that assures the secrecy and authenticity of data transfers between a user's input/output (I/O) device and a program trusted by that user. We argue that, despite its incontestable necessity, current commodity systems do not support trusted path with any significant assurance. This paper presents a hyper visor-based design that enables a trusted path to bypass an untrusted operating-system, applications, and I/O devices, with a minimal Trusted Computing Base (TCB). We also suggest concrete I/O architectural changes that will simplify future trusted-path system design. Our system enables users to verify the states and configurations of one or more trusted-paths using a simple, secret less, hand-held device. We implement a simple user-oriented trusted path as a case study.
INDEX TERMS
Virtual machine monitors, Hardware, Security, Performance evaluation, Registers, Aerospace electronics, Computers, Device Input/Output, Trusted Path, Trustworthy Computing, Hypervisor, Isolation
CITATION

J. Newsome, J. M. McCune, Zongwei Zhou and V. D. Gligor, "Building Verifiable Trusted Path on Commodity x86 Computers," 2012 IEEE Symposium on Security and Privacy(SP), San Francisco, CA USA, 2012, pp. 616-630.
doi:10.1109/SP.2012.42
186 ms
(Ver 3.3 (11022016))