- -

E-BOOT: Preventing Boot-Time Entropy

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

E-BOOT: Preventing Boot-Time Entropy

Mostrar el registro sencillo del ítem

Ficheros en el ítem

dc.contributor.author Vañó-García, Fernando es_ES
dc.contributor.author Marco-Gisbert, Héctor es_ES
dc.date.accessioned 2021-11-11T19:30:55Z
dc.date.available 2021-11-11T19:30:55Z
dc.date.issued 2020 es_ES
dc.identifier.uri http://hdl.handle.net/10251/176995
dc.description.abstract [EN] Due to the impracticability of generating true randomness by running deterministic algorithms in computers, boot-loaders and operating systems undergo the lack of enough supplies of entropy at boot-time. This problem remains a challenge and affects all computer systems, including virtualization technologies. Unfortunately, this situation leads to undesired side effects, affecting the security of important kernel components and causing large blocking waits in the start-up of userland processes. For example, SSHD is delayed up to 4 minutes. In this paper, we analyze the boot-time entropy starvation problem, performing a comprehensive analysis of the Linux kernel boot process revealing that the problem not only affects userland applications but up to 33 kernel functions at boot time. Those functions are weakly fed by random numbers from a non-initialized CSPRNG. To overcome this problem, we propose E-Boot, a novel technique that provides high-quality random numbers to guest virtual machines. E-Boot is the first technique that completely satisfies the entropy demand of virtualized boot-loaders and operating systems at boot time. We have implemented E-Boot in Linux v5.3 and our experiments show that it effectively solves the boot-time entropy starvation problem. Our proposal successfully feeds bootloaders and boot time Linux kernel hardening techniques with high-quality random numbers, reducing also to zero the number of userspace blocks and delays. The total time overhead introduced by E-Boot is around 2 mu s and has zero memory overhead, since the memory is freed before the kernel boot ends, which makes E-boot a practical solution for cloud systems. es_ES
dc.language Inglés es_ES
dc.publisher Institute of Electrical and Electronics Engineers es_ES
dc.relation.ispartof IEEE Access es_ES
dc.rights Reconocimiento (by) es_ES
dc.subject Cloud es_ES
dc.subject Virtualization es_ES
dc.subject Security es_ES
dc.subject Entropy es_ES
dc.subject Boot-time es_ES
dc.subject Operating systems es_ES
dc.subject.classification ARQUITECTURA Y TECNOLOGIA DE COMPUTADORES es_ES
dc.title E-BOOT: Preventing Boot-Time Entropy es_ES
dc.type Artículo es_ES
dc.identifier.doi 10.1109/ACCESS.2020.2984414 es_ES
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Informática de Sistemas y Computadores - Departament d'Informàtica de Sistemes i Computadors es_ES
dc.description.bibliographicCitation Vañó-García, F.; Marco-Gisbert, H. (2020). E-BOOT: Preventing Boot-Time Entropy. IEEE Access. 8:61872-61890. https://doi.org/10.1109/ACCESS.2020.2984414 es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion https://doi.org/10.1109/ACCESS.2020.2984414 es_ES
dc.description.upvformatpinicio 61872 es_ES
dc.description.upvformatpfin 61890 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 8 es_ES
dc.identifier.eissn 2169-3536 es_ES
dc.relation.pasarela S\439338 es_ES


Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem