Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660344
|View full text |Cite
|
Sign up to set email alerts
|

ARMlock

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 48 publications
(6 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Hardware-based isolation. Recent work [29], [44], [45], [46], [47], [48], [49] explores new hardware to implement additional isolation for containers. SCONE [44] and ARMlock [47] place the container inside trusted execution domain based on the Intel SGX and ARM TrustZone.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Hardware-based isolation. Recent work [29], [44], [45], [46], [47], [48], [49] explores new hardware to implement additional isolation for containers. SCONE [44] and ARMlock [47] place the container inside trusted execution domain based on the Intel SGX and ARM TrustZone.…”
Section: Related Workmentioning
confidence: 99%
“…Recent work [29], [44], [45], [46], [47], [48], [49] explores new hardware to implement additional isolation for containers. SCONE [44] and ARMlock [47] place the container inside trusted execution domain based on the Intel SGX and ARM TrustZone. FastPass [48] and Iron [46] further isolate memory management and network stack for containers.…”
Section: Related Workmentioning
confidence: 99%
“…DynaCut also shares the ideas of the principle of least privilege and software fault isolation [8,10,17,56,67]. The principle of least privilege ensures that any entity of a computing system (e.g., a process or a user) has access to only the necessary information for the intended functions [8].…”
Section: Related Workmentioning
confidence: 99%
“…In practice, untrusted components are isolated into fault domains, preventing untrusted code from compromising the trusted computing base (TCB) [56]. Several efforts split complex software systems into multiple reduced-privilege compartments [10,17,67], and isolate different components of the application code [10,41,54,56], untrusted third-party libraries [61,67], or even different OS components [17,59]. DynaCut dynamically updates the visibility of different code features and maintains the minimal code required for running software in a given scenario.…”
Section: Related Workmentioning
confidence: 99%
“…Traditionally, hardware memory management units (MMUs) prevent applications from interfering with each other and with core system functions. Software fault-isolation techniques extend the MMU by isolat-ing malicious code and been implemented for x86 and ARM architectures [37,46,47] or require hardware (MMU) support. These approaches require hardware (MMU) support not available on low power processors, and incur significant runtime overhead.…”
Section: Related Workmentioning
confidence: 99%