Skip to main content

Stabilizing Trust and Reputation for Self-Stabilizing Efficient Hosts in Spite of Byzantine Guests (Extended Abstract)

  • Conference paper
Book cover Stabilization, Safety, and Security of Distributed Systems (SSS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4838))

Included in the following conference series:

  • 311 Accesses

Abstract

This work presents a general and complete method to protect a system against possible malicious programs. We provide concepts for building a system that can automatically recover from an arbitrary state including even one in which a Byzantine execution of one or more programs repeatedly attempts to corrupt the system state. Preservation of a guest execution is guaranteed as long as the guest respects a predefined contract, while efficiency is improved by using stabilizing reputation. We augment a provable self-stabilizing host operating system implementation with a contract-enforcement framework example.

Partially supported by the Lynne and William Frankel Center for Computer Sciences and the Rita Altura trust chair in Computer Sciences.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, K., Agesen, O.: A Comparison of Software and Hardware Techniques for x86 Virtualization. In: ASPLOS. Proceedings of the Twelfth International Conference on Architectural Support for Programming Languages and Operating Systems, CA (2006)

    Google Scholar 

  2. Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of 1997 IEEE Symposium on Computer Security and Privacy, IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  3. Bellard, F.: QEMU, a Fast and Portable Dynamic Translator. In: Proc. of USENIX Annual Technical Conference. FREENIX Track (2005)

    Google Scholar 

  4. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. In: Proceedings of the nineteenth ACM symposium on Operating systems principles, Bolton Landing, NY, USA (2003)

    Google Scholar 

  5. Brukman, O., Dolev, S., Haviv, Y., Yagel, R.: Self-Stabilization as a Foundation for Autonomic Computing. In: FOFDC. Proceedings of the Second International Conference on Availability, Reliability and Security, Workshop on Foundations of Fault-tolerant Distributed Computing, Vienna, Austria (April 2007)

    Google Scholar 

  6. Back, G., Hsieh, W.H., Lepreau, J.: Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. In: OSDI. Proc. 4th Symposium on Operating Systems Design and Implementation, San Diego, CA (2000)

    Google Scholar 

  7. Buchegger, S., Le Boudec, J.-Y.: A Robust Reputation System for Mobile Ad-hoc Networks. Technical Report IC/2003/50, EPFL-IC-LCA (2003)

    Google Scholar 

  8. Bochs IA-32 Emulator Project. http://bochs.sourceforge.net/

  9. Bershad, B.N., Savage, S., Pardyak, P., Sirer, E.G., Fiuchynski, M., Becker, D., Eggers, S., Chambers, C.: Extensibility, Safety, and Performance in the SPIN Operating System. In: Proceedings of the 15th ACM Symposium on Operating Systems Principles, Colorado, December (1995)

    Google Scholar 

  10. Ben-Yehuda, M., Xenidis, J., Mostrows, M., Rister, K., Bruemmer, A., Van Doorn, L.: The Price of Safety: Evaluating IOMMU Performance. In: OLS. The 2007 Ottawa Linux Symposium (2007)

    Google Scholar 

  11. Chase, J.S., Levy, H.M., Feeley, M.J., Lazowska, E.D.: Sharing and Protection in a Single-Address-Space Operating System. ACM Transactions on Computer Systems 12(4) (November 1994)

    Google Scholar 

  12. Cai, H., Shao, Z., Vaynberg, A.: Certified Self-Modifying Code. In: Proceedings of PLDI 2007, CA (2007)

    Google Scholar 

  13. Dijkstra, E.W.: Self-Stabilizing Systems in Spite of Distributed Control. Communications of the ACM 17(11), 643–644 (1974)

    Article  MATH  Google Scholar 

  14. Dolev, S.: Self-Stabilization. The MIT Press, Cambridge (2000)

    MATH  Google Scholar 

  15. Dike, J.: A User-mode Port of the Linux Kernel. In: 5th Annual Linux Showcase and Conference, Oakland, California (2001)

    Google Scholar 

  16. Daliot, A., Dolev, D.: Self-stabilizing Byzantine Agreement. In: PODC 2006. Proc. of Twenty-fifth ACM Symposium on Principles of Distributed Computing, Colorado (2006)

    Google Scholar 

  17. Dolev, S., Haviv, Y.: Stabilization Enabling Technology. In: Datta, A.K., Gradinariu, M. (eds.) SSS 2006. LNCS, vol. 4280, pp. 1–15. Springer, Heidelberg (2006)

    Google Scholar 

  18. Dolev, S., Welch, J.: Self-Stabilizing Clock Synchronization in the Presence of Byzantine Faults. In: UNLV. Proc. of the 2nd Workshop on Self-Stabilizing Systems (1995). Journal of the ACM, Vol. 51, No. 5, pp. 780-799, September 2004.

    Google Scholar 

  19. Dolev, S., Yagel, R.: Toward Self-Stabilizing Operating Systems. In: SAACS04,DEXA. Proceedings of the 15th International Conference on Database and Expert Systems Applications, 2nd International Workshop on Self-Adaptive and Autonomic Computing Systems, Zaragoza, Spain, pp. 684–688 (August 2004)

    Google Scholar 

  20. Dolev, S., Yagel, R.: Memory Management for Self-Stabilizing Operating Systems. In: Proceedings of the 7th Symposium on Self Stabilizing Systems, Barcelona, Spain (2005). also in Journal of Aerospace Computing, Information, and Communication (JACIC), 2006.

    Google Scholar 

  21. Dolev, S., Yagel, R.: Self-Stabilizing Device Drivers. In: Datta, A.K., Gradinariu, M. (eds.) SSS 2006. LNCS, vol. 4280, pp. 276–289. Springer, Heidelberg (2006)

    Google Scholar 

  22. ECMA International. ECMA-335 Common Language Infrastructure (CLI), 4th Edition, Technical Report (2006)

    Google Scholar 

  23. Ferrie, P.: Attacks on Virtual Machine Emulators. Symantec Advanced Threat Research, http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf

  24. Goldberg, R.: Architectural Principles for Virtual Computer Systems. Ph.D. thesis, Harvard University, Cambridge, MA (1972)

    Google Scholar 

  25. Garfinkel, T., Adams, K., Warfield, A., Franklin, J.: Compatibility Is Not Transparency: VMM Detection Myths and Realities. In: Proceedings of the 11th Workshop on Hot Topics in Operating Systems, San Diego, CA (2007)

    Google Scholar 

  26. Guha, R., Kumar, R., Raghavani, P., Tomkins, A.: Propagation of trust and distrust. In: WWW. Proceedings of the 13th International World Wide Web conference (2004)

    Google Scholar 

  27. Gong, L., Mueller, M., Prafullchandra, H., Schemers, R.: Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In: Proceedings of the USENIX Symposium on Internet Technologies and Systems (1997)

    Google Scholar 

  28. Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: Proceedings of SOSP 2003 (2003)

    Google Scholar 

  29. Hunt, G., Larus, J.: Singularity: Rethinking the Software Stack. Operating Systems Review 41(2) (April 2007)

    Google Scholar 

  30. Hunt, G., Aiken, M., Fhndrich, M., Hawblitzel, C., Hodson, O., Larus, J., Levi, S., Steensgaard, B., Tarditi, D., Wobber, T.: Sealing OS Processes to Improve Dependability and Safety. In: Proceedings of EuroSys2007, Lisbon, Portugal (March 2007)

    Google Scholar 

  31. Intel Corporation. Reliability, Availability, and Serviceability for the Always-on Enterprise, The Enhanced RAS Capabilities of Intel Processor-based Server Platforms Simplify 24 x7 Business Solutions, Technology@Intel Magazine (August 2005), http://www.intel.com/technology/magazine/Computing/Intel_RAS_WP_0805.pdf

  32. Intel Corporation. The IA-32 Intel Architecture Software Developer’s Manual (2006), http://developer.intel.com/products/processor/manuals/index.htm

  33. Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer, 41–50 (January 2003), See also http://www.research.ibm.com/autonomic

  34. KVM: Kernel-based Virtual Machine for Linux, http://kvm.qumranet.com/

  35. King, S.T., Chen, P.M., Wang, Y., Verbowski, C., Wang, H.J., Lorch, J.R.: SubVirt: Implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy (May 2006)

    Google Scholar 

  36. Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Symposium on Information Sciences and Systems, Princeton University (March 1971). Reprinted in ACM Operating Systems Review (January 1974)

    Google Scholar 

  37. Lamport, L., Shostak, R., Pease, M.: The Byzantine Generals Problem. ACM Trans. on Programming Languages and Systems 4(3), 382–401 (1982)

    Article  MATH  Google Scholar 

  38. Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA (2002)

    Google Scholar 

  39. Mastipuram, R., Wee, E.C.: Soft errors’ impact on system reliability. Voice of Electronics Engineer (2004), http://www.edn.com/article/CA454636.html

  40. Neumann, P.G.: Computer-Related Risks. Addison-Wesley, Reading (1995)

    Google Scholar 

  41. Neiger, G., Santony, A., Leung, F., Rogers, D., Uhlig, R.: Virtualization Technology: Hardware Support for Efficient Processor Virtualization. Intel Technology Journal 10(3) (August 2006)

    Google Scholar 

  42. Patterson, D., Brown, A., Broadwell, P., Candea, G., Chen, M., Cutler, J., Enriquez, P., Fox, A., Kiciman, E., Merzbacher, M., Oppenheimer, D., Sastry, N., Tetzlaff, W., Traupman, J., Treuhaft, N.: Recovery Oriented Computing(ROC): Motivation, definition, techniques and case studies. UC Berkeley Computer Science Technical Report UCB/CSD-02-1175, Berkeley, CA  (March 2002)

    Google Scholar 

  43. Popek, G.J., Goldberg, R.P.: Formal Requirements for Virtualizable Third Generation Architectures. Communications of the ACM 17(7), 412–421 (1974)

    Google Scholar 

  44. Swift, M., Bershad, B.N., Levy, H.M.: Improving the reliability of commodity operating systems. In: SOSP 2003. Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY (October 2003). See also: M. Swift. Improving the Reliability of Commodity Operating Systems, Ph.D. Dissertation, University of Washington (2005)

    Google Scholar 

  45. Sharma, A., Welch, S.: Preserving the integrity of enterprise platforms via an Assured eXecution Environment (AxE). In: OSDI. A poster at the 7th Symposium on Operating Systems Design and Implementation (2006)

    Google Scholar 

  46. Rutkowska, J.: “Subvirting Vista Kernel For Fun and Profit — Part II Blue Pill” , see also (2006), http://www.whiteacid.org/misc/bh2006/070_Rutkowska.pdf , http://www.whiteacid.org/papers/redpill.html

  47. Robin, J., Irvine, C.: Analysis of the Intel Pentiums Ability to Support a Secure Virtual Machine Monitor. In: Usenix annual technical conference (2000)

    Google Scholar 

  48. Ray, E., Schultz, E.E.: An early look at Windows Vista security. Computer Fraud & Security 2007(1) (2007)

    Google Scholar 

  49. Schroeder, M.D.: Cooperation of Mutually Suspicious Subsystems in a Computer Utility. Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA (September 1972)

    Google Scholar 

  50. SOS download page. http://www.cs.bgu.ac.il/~yagel/sos , 2007

  51. Soltesz, S., Pötzl, H., Fiuczynski, M.E., Bavier, A., Peterson, L.: Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. In: Proceedings of the 2007 EuroSys conference, Lisbon, Portugal (2007)

    Google Scholar 

  52. http://www.selfstabilization.org

  53. Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1268–1308 (1975)

    Article  Google Scholar 

  54. Sun Microsystems, Inc. ‘Predictive Self-Healing in the SolarisTM 10 Operating System”, White paper (September 2004), http://www.sun.com/software/solaris/ds/self_healing.pdf

  55. Tygar, J.D., Yee, B.: Dyad: A system for using physically secure coprocessors. In: Proceedings of IP Workshop (1994)

    Google Scholar 

  56. Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient Software-based fault isolation. In: Proceedings of the Sym. On Operating System Principles (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Toshimitsu Masuzawa Sébastien Tixeuil

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dolev, S., Yagel, R. (2007). Stabilizing Trust and Reputation for Self-Stabilizing Efficient Hosts in Spite of Byzantine Guests (Extended Abstract). In: Masuzawa, T., Tixeuil, S. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2007. Lecture Notes in Computer Science, vol 4838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76627-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76627-8_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76626-1

  • Online ISBN: 978-3-540-76627-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics