首页> 外文会议>International Conference on Advanced Communication Technology >Secure browser architecture based on hardware virtualization
【24h】

Secure browser architecture based on hardware virtualization

机译:基于硬件虚拟化的安全浏览器架构

获取原文

摘要

Ensuring the entire code base of a browser to deal with the security concerns of integrity and confidentiality is a daunting task. The basic method is to split it into different components and place each of them in its own protection domain. OS processes are the prevalent isolation mechanism to implement the protection domain, which result in expensive context-switching overheads produced by Inter-Process Communication (TPC). Besides, the dependences of multiple web instance processes on a single set of privileged ones reduce the entire concurrency. In this paper, we present a secure browser architecture design based on processor virtualization technique. First, we divide the browser code base into privileged components and constrained components which consist of distrusted web page Tenderer components and plugins. All constrained components are in the form of shared object (SO) libraries. Second, we create an isolated execution environment for each distrusted shared object library using the hardware virtualization support available in modern Intel and AMD processors. Different from the current researches, we design a custom kernel module to gain the hardware virtualization capabilities. Third, to enhance the entire security of browser, we implement a validation mechanism to check the OS resources access from distrusted web page Tenderer to the privileged components. Our validation rules is similar with Google chrome. By utilizing VMENTER and VMEXIT which are both CPU instructions, our approach can gain a better system performance substantially.
机译:确保浏览器的整个代码库处理完整性和机密性的安全问题是一项艰巨的任务。基本方法是将其拆分为不同的组件,并将每个组件放置在其自己的保护域中。 OS进程是实现保护域的普遍隔离机制,这导致进程间通信(TPC)产生了昂贵的上下文切换开销。此外,多个Web实例进程对一组特权进程的依赖减少了整个并发性。在本文中,我们提出了一种基于处理器虚拟化技术的安全浏览器体系结构设计。首先,我们将浏览器代码库分为特权组件和受约束组件,这些特权组件和受约束组件由不信任的Web页面Tenderer组件和插件组成。所有受约束的组件均采用共享库(SO)库的形式。其次,我们使用现代Intel和AMD处理器中可用的硬件虚拟化支持,为每个不信任的共享对象库创建一个隔离的执行环境。与当前的研究不同,我们设计了一个定制的内核模块来获得硬件虚拟化功能。第三,为了增强浏览器的整体安全性,我们实施了一种验证机制,以检查从不可信的网页Tenderer到特权组件的OS资源访问。我们的验证规则与Google chrome类似。通过利用都是CPU指令的VMENTER和VMEXIT,我们的方法可以实质上获得更好的系统性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号