Accountable Execution of Untrusted Programs
نویسندگان
چکیده
Many networked applications could beneet from executing components of their functionality closer to the data or services with which they interact. By doing this they may be able to circumvent long communication latencies or avoid transferring large quantities of data over congested or expensive network links. However, no public infrastructure currently exists to enable users to do this; they are restricted to running applications on systems which are either owned by them or dedicated to them. We propose a system that can execute code supplied by an untrusted user, yet can charge this user for all resources consumed by the computation. Such servers could be deployed at strategic locations throughout the Internet, enabling network users such as content providers to distribute their applications in a manner that is both eecient in terms of performance and-nancial cost. We call such a server a Xenoserver 1. This paper discusses the construction of such a system, examining how accounting, billing and quality of service provision can be achieved.
منابع مشابه
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs. This approach is based on isolating the effects of untrusted program execution from the rest of the system. Isolation is achieved by intercepting and redirecting file modification operations made by the untrusted process so that they access a “modification cache” invisible to other processes in the system. To ens...
متن کاملXenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication latencies or avoid transferring data over congested or expensive network links. However, no public infrastructure currently exists that enables this. We propose a system that can execute code supplied by an untrusted us...
متن کاملProof Carrying Code
Proof-Carrying Code (PCC) is a technique that can be used for safe execution of untrusted code. In a typical instance of PCC, a code receiver establishes a set of safety rules that guarantee safe behavior of programs, and the code producer creates a formal safety proof that proves, for the untrusted code, adherence to the safety rules. Then, the receiver is able to use a simple and fast proof v...
متن کاملJAMUSUne plate-forme d'accueil sécurisée pour le code mobile
JAMUS (Java Accommodation of Mobile Untrusted Software) is a Java platform dedicated to the accommodation of untrusted programs that can specify their requirements regarding the resources available on the system. It relies on the principle of resource contracting in order to offer a certain level of quality of service to hosted programs, while ensuring a safe execution of these programs at runt...
متن کاملProof-Carrying Code for x86 Architectures
This paper presents an extension of Necula and Lee’s Proof-Carrying Code (PCC) system to support the x86 architecture. PCC is a security scheme which allows the safe execution of untrusted code. Untrusted code to be executed is required to be coupled with a proof that the code satisfies certain safety properties. This code-proof pair is statically checked by the client system prior to execution...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998