DocumentCode :
3100527
Title :
TrustGraph: Trusted Graphics Subsystem for High Assurance Systems
Author :
Okhravi, Hamed ; Nicol, David M.
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
fYear :
2009
fDate :
7-11 Dec. 2009
Firstpage :
254
Lastpage :
265
Abstract :
High assurance MILS and MLS systems require strict limitation of the interactions between different security compartments based on a security policy. Virtualization can be used to provide a high degree of separation in such systems. Even with perfect isolation, however, the I/O devices are shared between different security compartments. Among the I/O controllers, the graphics subsystem is the largest and the most complex. This paper describes the design and implementation of TrustGraph, a trusted graphics subsystem for high assurance systems. First, we explain the threats and attacks possible against an unsecured graphics subsystem. We then describe the design of TrustGraph, the security principles it is built upon, and its implementation. Finally, we verify our implementation through different levels of verification which include functionality testing for simple operations, attack testing for security mechanisms, and formal verification for the critical components of the implementation. An analysis of the graphics API covert channel attack is presented, its channel capacity is measured, and the capacity is reduced using the idea of fuzzy time.
Keywords :
computer graphics; formal verification; security of data; TrustGraph; attack testing; channel capacity measurement; formal verification; functionality testing; fuzzy time; graphics API covert channel attack; high assurance system; multilevel security system; security mechanism; security policy; security principles; trusted graphics subsystem; virtualization; Communication system security; Computer security; Data security; Graphics; Information security; Interference; Multilevel systems; Testing; Virtual manufacturing; Voice mail; Covert Channel Analysis; Formal Verification; Multi-Level Security; Trusted Graphics; Virtualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2009. ACSAC '09. Annual
Conference_Location :
Honolulu, HI
ISSN :
1063-9527
Print_ISBN :
978-0-7695-3919-5
Type :
conf
DOI :
10.1109/ACSAC.2009.31
Filename :
5380684
Link To Document :
بازگشت