Publication | Open Access
A hardware architecture for implementing protection rings
210
Citations
8
References
1972
Year
Hardware Processor MechanismsEngineeringInformation SecurityComputer ArchitectureAccess PrivilegeFormal VerificationSoftware AnalysisHardware SecurityShared MemoryTrusted Execution EnvironmentSecure ComputingHardware Security SolutionMemory ManagementConcurrent ProgrammingOperating System SecurityComputer EngineeringComputer ScienceData SecurityCryptographyProgram AnalysisComputer UtilityFormal MethodsSystem SoftwareProtection Rings
Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation. This paper describes hardware processor mechanisms for implementing these rings of protection. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to the supervisor. Automatic hardware validation of references across ring boundaries is also performed. Thus, a call by a user procedure to a protected subsystem (including the the supervisor) is identical to a call to a companion user procedure. The mechanisms of passing and referencing arguments are the same in both cases as well.
| Year | Citations | |
|---|---|---|
Page 1
Page 1