Virtics: A System for Privilege Separation of Legacy Desktop Applications
نویسندگان
چکیده
Legacy desktop applications – the applications in use on most desktops today – often process data from multiple untrusted sources. If an application makes a mistake when processing this data, the integrity of the application, and potentially the entire system, can be compromised. We introduce a new operating system primitive that enables an application running on a legacy OS to efficiently create unprivileged virtual machines when dealing with untrusted data. These virtual machines can then perform all of the complex operations needed to process and render the application’s data. The resulting window content is transparently mapped into the window space of the application. Using this primitive, we built an evince-based PDF viewer that limits PDF exploits to controlling an unprivileged virtual machine with file access only to the PDF itself. We also built a WebKit-based web browser which limits browser exploits to controlling an unprivileged virtual machine with access solely to the contents of the tab in which the exploit occurred. We further show how a whole suite of desktop applications can use our new primitive to separate privileges when dealing with untrusted data. Moving recursively upwards, we can view the operating system itself as an application that needs privilege separation when dealing with untrusted data from multiple sources (i.e. the different applications it runs). We describe a prototype implementation of an operating system that manages its applications in this way.
منابع مشابه
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying them often results in system services being unavailable for some time. This can force administrators to leave system services in an insecure state for extended periods. To address these system security issues, we have dev...
متن کاملWedge: Splitting Applications into Reduced-Privilege Compartments
Software vulnerabilities and bugs persist, and so exploits continue to cause significant damage, particularly by divulging users’ sensitive data to miscreants. Yet the vast majority of networked applications remain monolithically structured, in stark contravention of the ideal of least-privilege partitioning. Like others before us, we believe this state of affairs continues because today’s oper...
متن کاملSecure Isolation and Migration of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are applied to address security issues, they often result in system services being unavailable for some time. To address these system security and availability issues, we have developed peas and pods. A pea provides a least privilege environment...
متن کاملA Method Proposal for Implementing Accessibility in Desktop Applications for Visually Impaired Users
Currently, little is said about the accessibility-oriented desktop applications. In the case of this study, problems related to the application structure, which has characteristics of a legacy software, brings challenges that hinder the implementation of accessibility. This article shows an implementation of accessibility by applying the concepts of web standards in desktop applications, addres...
متن کاملARWin-A Desktop Augmented Reality Window Manager
We present ARWin, a single user 3D augmented reality desktop window manager, placing 3D user interfaces into a physical desktop workspace. We explain our design considerations and system architecture, exhibiting the ease with which such a system can be developed and used. We showcase a number of novel 3D applications, which take advantage of the environment to provide more powerful interactions...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010