Operating System Protection for Fine-Grained Programs

نویسندگان

  • Trent Jaeger
  • Jochen Liedtke
  • Nayeem Islam
چکیده

We present an operating system-level security model for controlling ne-grained programs, such as downloaded executable content, and compare this security model's implementation to that of language-based security models. Language-based security has wellknown limitations, such as the lack of complete mediation (e.g., for compiled programs or race condition attacks) and faulty self-protection (e ective security is unproven). Operating system-level models are capable of complete mediation and self-protection, but some researchers argue that operating systemlevel security models are unlikely to supplant such language-based models because they lack portability and performance. In this paper, we detail an operating system-level security model built on the Lava Nucleus, a minimal, fast -kernel operating system. We show how it can enforce security requirements for ne-grained programs and show that its performance overhead (with the additional security) can be virtually negligible when compared to languagebased models. Given the su cient performance and security, the portability issue should become moot because other vendors will have to meet the higher security and performance expectations of their customers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Handling Memory Corruption Faults In Sensor Networks

Typical sensor nodes use resource constrained micro-controllers where user level applications, operating system components, device drivers, etc., reside within a single address space with no form of memory protection. A programming error in an application can easily corrupt the state of the operating system and other software components on the node. To protect against such errors, we propose a ...

متن کامل

Implementing a secure setuid program

Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root privileges, allowing attackers to gain root privileges by exploiting vulnerabilities in the setuid-root programs. The vulnerabilities usually lie in code that does not require root privileges. Nevertheless, the entire cod...

متن کامل

Cherub: Fine-grained application protection with on-demand virtualization

Cherub is an on-demand virtualization mechanism aiming to provide fine-grained application protection in untrusted environments. By leveraging late launch technology, Cherub dynamically inserts a lightweight virtual machine monitor (VMM) under a commodity operating system (OS) when critical pieces of an application code or data are to be processed. The novel design of Cherubwith a double-shadow...

متن کامل

The structure of a type safe operating system

The architecture of traditional operating systems relies on address-based memory protection. To achieve flexibility at a low cost operating system research has recently started to explore alternative protection mechanisms, such as type safety. This dissertation presents an operating system architecture that completely replaces address-based protection with type-based protection. Replacing such ...

متن کامل

Hardware Works, Software Doesn't: Enforcing Modularity with Mondriaan Memory Protection

Two big problems with operating systems written in unsafe languages are that they crash too often and that adding features becomes much more difficult over time. One cause of both of these problems is the lack of enforceable memory protection between module boundaries. Clear module boundaries make dependencies explicit, resulting in more reliable and maintainable code. Mondriaan Memory Protecti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998