DOI QR코드

DOI QR Code

Inter-GuestOS Communications in Multicore-based ARM TrustZone

멀티코어 프로세서 기반 ARM TrustZone 환경에서의 게스트 운영체제 간 통신

  • 전무웅 (고려대학교 임베디드소프트웨어대학원) ;
  • 김세원 (고려대학교 컴퓨터.전파통신공학과) ;
  • 유혁 (고려대학교 컴퓨터.전파통신공학과)
  • Received : 2014.01.06
  • Accepted : 2015.02.06
  • Published : 2015.05.15

Abstract

The technology using ARM TrustZone draws attention as a new embedded virtualization approach. The ARM TrustZone defines two virtual execution environment, the secure world and the normal world. In such an environment, the inter-world communication is important to extend function of software. However, the current monitor software does not sufficiently support the inter-world communication. This paper presents a new inter guestOS communication scheme, for each world, for the ARM TrustZone virtualization. The proposed communication scheme supports bidirectional inter-world communication for single core and multicore environment. In this paper, It is implemented on a NVIDIA Tegra3 processor based on the ARM Cortex-A9 MPCore and it showed a bandwidth of 30MB/s.

ARM TrustZone을 이용한 기술은 새로운 임베디드 시스템의 가상화 연구로 관심을 끌고 있다. ARM TrustZone은 secure world와 normal world라는 두 개의 가상 실행 환경을 정의한다. 소프트웨어의 기능을 확장하기 위한 방법으로 ARM TrustZone 환경에서 world 간 통신은 중요하다. 그러나 현재의 모니터 모드의 소프트웨어는 world 간 통신을 충분히 지원하지 않고 있다. 본 논문에서는 ARM TrustZone을 이용한 각 world에서 구동되는 게스트 운영체제 간의 새로운 통신 메커니즘을 제시한다. 제안한 통신 메카니즘은 싱글코어와 멀티코어에서 양방향 world 간 통신을 지원한다. 본 논문에서는 ARM Cortex-A9 MPCore 기반의 NVIDIA Tegra3 processor를 사용하였고, 30MB/s이상의 통신 성능을 보여주었다.

Keywords

Acknowledgement

Supported by : 한국연구재단

References

  1. ARM Security Technology. Building a Secure System using TrustZone Technology, PRD29-GENC-009492C, ARM Ltd., 2009.
  2. J. Winter, "Trusted computing building blocks for embedded linux-based arm trustzone platforms," Proc. of the 3rd ACM workshop on Scalable trusted computing, pp. 21-30. ACM, 2008.
  3. X. Yan-ling, P. Wei, Z. Xin-guo, "Design and implementation of secure embedded systems based on trustzone," Proc. of the IEEE Internaltional Confreence on Embedded Software and Systems (ICESS'08), pp. 136-141, 2008.
  4. W.H. Hussin, R. Edwards, P. Coulton, "E-pass using drm in symbian v8 os and trustzone : Securing vital data on mobile devices," Proc. of the Internaltional Conference on Mobile Business (ICMB), pp. 14-14, 2006.
  5. C. Takei, H. Takada, M. Yamamoto, S. Honda, "Integrated software platform for automotive systems," Proc. of the IEEE International SoC Design Conference (ISOCC), pp. 377-379, 2009.
  6. Integrity secure virtualization, http://www.ghs.com/products/ rtos/integrity_virtualization.html#ARM,May2010.
  7. D. Sangorrin, S. Honda, H. Takada, "Dual operating system architecture for real-time embedded systems," Proc. of the OSPERT, Jul. 2010.
  8. D. Sangorrin, S. Honda, H. Takada, "Reliable device sharing mechanisms for dual-os embedded trusted computing," In Trust and Trustworthy Computing, volume 7344 of Lecture Notes in Computer Science, pp. 74-91, Springer Berlin Heidelberg, 2012.
  9. S. Yoo, C. Hong, C. Yoo, Y. Liu, Y. Zhang, "Mobi- VMM: a Virtual Machine Monitor for Mobile Phones," The Workshop on Virtualization in Mobile Computing Held in conjunction with MobiSys 2008 (MobiVirt 2008), Sep. 2008.
  10. S. Yoo, C. Yoo, "Real-time Scheduling for Xen-ARM Virtual Machines," IEEE Transactions on Mobile Computing, vol. PrePrints, no. 99, pp. 1-12, Aug. 2013.
  11. P. Barham, et al., "Xen and the art of virtualization," Proc. of the ACM symposium on Operating systems principles, pp. 164-177, 2003.
  12. ARM Limited, "AMBA3 TrustZone Protection Controller (BP147) Technical Overview, DTO 0015A," 2004.
  13. "ARM Generic Interrupt Controller Architecture Specification," ARM IHI 0048A, ARM Ltd., 2008.