Show simple item record

dc.rights.licenseUsers may download and share copies with attribution in accordance with a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. No commercial use or derivatives are permitted without the explicit approval of the author.
dc.contributorYener, Bülent, 1959-
dc.contributorCarothers, Christopher D.
dc.contributorSzymanśki, Bolesław
dc.contributorMcDonald, John F. (John Francis), 1942-
dc.contributor.authorZonenberg, Andrew D.
dc.date.accessioned2021-11-03T08:25:01Z
dc.date.available2021-11-03T08:25:01Z
dc.date.created2015-06-09T13:40:28Z
dc.date.issued2015-05
dc.identifier.urihttps://hdl.handle.net/20.500.13015/1442
dc.descriptionMay 2015
dc.descriptionSchool of Science
dc.description.abstractSecurity of monolithic kernels, and even microkernels, relies on a large and complex body of code (including both software and hardware components) being entirely bug-free. Most contemporary operating systems can be completely compromised by a bug anywhere in this codebase, from the network stack to the CPU pipeline's handling of privilege levels, regardless of whether a particular application uses that feature or not. Even formally verified software is vulnerable to failure when the hardware, or the hardware-software interface, has not been verified.
dc.description.abstractThe prototype Antikernel system was written in a mixture of Verilog, C, and MIPS assembly language for the actual operating system, plus a large body of C++ in debug/support tools which are used for development but do not actually run on the target system. The prototype was verified with a combination of simulation (Xilinx ISim), formal model checking (using the MiniSAT solver integrated with yosys), and hardware testing (using a batch processing cluster consisting of Xilinx Spartan-3A, Spartan-6, Artix-7, and Kintex-7 FPGAs).
dc.description.abstractThe Antikernel architecture is unique in that there is no "all-powerful" software which has the ability to read or modify arbitrary data on the system, gain low-level control of the hardware, etc. All software is unprivileged; the concept of "root" or "kernel mode" simply does not exist so there is no possibility of malicious software achieving such capabilities.
dc.description.abstractThis thesis describes Antikernel, a novel operating system architecture consisting of both hardware and software components and designed to be fundamentally more secure than the existing state of the art. In order to make formal verification easier, and improve parallelism, the Antikernel system is highly modular and consists of many independent hardware state machines (one or more of which may be a general-purpose CPU running application or systems software) connected by a packet-switched network-on-chip (NoC).
dc.language.isoENG
dc.publisherRensselaer Polytechnic Institute, Troy, NY
dc.relation.ispartofRensselaer Theses and Dissertations Online Collection
dc.subjectComputer science
dc.titleAntikernel: a decentralized secure hardware-software operating system architecture
dc.typeElectronic thesis
dc.typeThesis
dc.digitool.pid175895
dc.digitool.pid175896
dc.digitool.pid175898
dc.digitool.pid175897
dc.rights.holderThis electronic version is a licensed copy owned by Rensselaer Polytechnic Institute, Troy, NY. Copyright of original work retained by author.
dc.description.degreePhD
dc.relation.departmentDept. of Computer Science


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record