1st International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

The Nizza secure-system architecture

  • @INPROCEEDINGS{10.1109/COLCOM.2005.1651218,
        author={Hermann H\aa{}rtig and Michael Hohmuth and Norman Feske and Christian Helmuth and Adam Lackorzynski and Frank Mehnert and Michael Peter},
        title={The Nizza secure-system architecture},
        proceedings={1st International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2006},
        month={7},
        keywords={Application software  Banking  Computer architecture  Computer security  Concurrent computing  Data security  Handheld computers  Isolation technology  Kernel  Operating systems},
        doi={10.1109/COLCOM.2005.1651218}
    }
    
  • Hermann Härtig
    Michael Hohmuth
    Norman Feske
    Christian Helmuth
    Adam Lackorzynski
    Frank Mehnert
    Michael Peter
    Year: 2006
    The Nizza secure-system architecture
    COLLABORATECOM
    IEEE
    DOI: 10.1109/COLCOM.2005.1651218
Hermann Härtig1,*, Michael Hohmuth1,*, Norman Feske1,*, Christian Helmuth1,*, Adam Lackorzynski1,*, Frank Mehnert1,*, Michael Peter1,*
  • 1: Technische Universität Dresden, Institute for System Architecture, D-01062 Dresden, Germany
*Contact email: nizza-secarch@os.inf.tu-dresden.de, nizza-secarch@os.inf.tu-dresden.de, nizza-secarch@os.inf.tu-dresden.de, nizza-secarch@os.inf.tu-dresden.de, nizza-secarch@os.inf.tu-dresden.de, nizza-secarch@os.inf.tu-dresden.de, nizza-secarch@os.inf.tu-dresden.de

Abstract

The trusted computing bases (TCBs) of applications running on today's commodity operating systems have become extremely large. This paper presents an architecture that allows to build applications with a much smaller TCB. It is based on a kernelized architecture and on the reuse of legacy software using trusted wrappers. We discuss the design principles, the architecture and some components, and a number of usage examples.