Fine-Grained User-Space Security Through Virtualization

被引:23
|
作者
Payer, Mathias [1 ]
Gross, Thomas R. [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
关键词
Security; Performance; Virtualization; Dynamic binary translation; Dynamic instrumentation; User-space software virtualization; Process sandboxing; Policy-based system call authorization; Optimization;
D O I
10.1145/2007477.1952703
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents an approach to the safe execution of applications based on software-based fault isolation and policy-based system call authorization. A running application is encapsulated in an additional layer of protection using dynamic binary translation in user-space. This virtualization layer dynamically recompiles the machine code and adds multiple dynamic security guards that verify the running code to protect and contain the application. The binary translation system redirects all system calls to a policy-based system call authorization framework. This interposition framework validates every system call based on the given arguments and the location of the system call. Depending on the user-loadable policy and an extensible handler mechanism the framework decides whether a system call is allowed, rejected, or redirect to a specific user-space handler in the virtualization layer. This paper offers an in-depth analysis of the different security guarantees and a performance analysis of libdetox, a prototype of the full protection platform. The combination of software-based fault isolation and policy-based system call authorization imposes only low overhead and is therefore an attractive option to encapsulate and sandbox applications to improve host security.
引用
收藏
页码:157 / 168
页数:12
相关论文
共 50 条
  • [41] Achieving incremental compilation through fine-grained builds
    Univ of Sydney, Sydney
    [J]. Software Pract Exper, 5 (497-517):
  • [42] Achieving incremental compilation through fine-grained builds
    Cooper, T
    Wise, M
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1997, 27 (05): : 497 - 517
  • [43] Authenticating Users Through Fine-Grained Channel Information
    Liu, Hongbo
    Wang, Yan
    Liu, Jian
    Yang, Jie
    Chen, Yingying
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (02) : 251 - 264
  • [44] FINE-GRAINED MONOLITH
    Louw, Michael
    [J]. ARCHITECTURE SOUTH AFRICA, 2019, (96): : 48 - 49
  • [45] Is fine-grained viable?
    Aaldering, M
    [J]. EDN, 1997, 42 (02) : 28 - 28
  • [46] Facilitating the Communication of Politeness through Fine-Grained Paraphrasing
    Fu, Liye
    Fussell, Susan R.
    Danescu-Niculescu-Mizil, Cristian
    [J]. PROCEEDINGS OF THE 2020 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP), 2020, : 5127 - 5140
  • [47] Fine-Grained Cryptography
    Degwekar, Akshay
    Vaikuntanathan, Vinod
    Vasudevan, Prashant Nalini
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 533 - 562
  • [48] FG-RS: Capture user fine-grained preferences through attribute information for Recommender Systems
    Chen, Hai
    Qian, Fulan
    Chen, Jie
    Zhao, Shu
    Zhang, Yanping
    [J]. NEUROCOMPUTING, 2021, 458 : 195 - 203
  • [49] Leveraging the fine-grained user preferences with graph neural networks for recommendation
    Wang, Gang
    Wang, Hanru
    Liu, Jing
    Yang, Ying
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2023, 26 (04): : 1371 - 1393
  • [50] Attribute-Based Fine-Grained Access Control with User Revocation
    Ye, Jun
    Zhang, Wujun
    Wu, Shu-lin
    Gao, Yuan-yuan
    Qiu, Jia-tao
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 586 - 595