首页> 外文期刊>Computing reviews >Virtual Ghost: protecting applications from hostile operating systems
【24h】

Virtual Ghost: protecting applications from hostile operating systems

机译:虚拟Ghost:保护应用程序免受恶意操作系统的攻击

获取原文
获取原文并翻译 | 示例
       

摘要

Operating systems are very complex, with millions of lines of code; in general, they cannot be proven secure. They may contain malware, or they may have been compromised by attackers. This means that, in many cases, they cannot be trusted. Protecting applications against attacks coming from the operating system requires elaborate solutions, and several approaches have been presented. Virtual Ghost, the new system presented in this paper, is based on compiler instrumentation and runtime checks. This approach effectively inserts a small hardware abstraction layer between the kernel and the hardware providing operations to be used by the kernel to manipulate hardware, and provides some trusted services for secure applications. Virtual Ghost runs as a regular library at the same privilege level as the kernel. The paper discusses the architectural aspects of Virtual Ghost and shows how it can handle all types of attacks by an operating system on applications. The performance analysis of a prototype shows reasonable overhead for providing this level of security to applications and to the kernel itself.
机译:操作系统非常复杂,有数百万行代码。通常,不能证明它们是安全的。它们可能包含恶意软件,或者可能已被攻击者破坏。这意味着,在许多情况下,它们是不可信任的。保护应用程序免受来自操作系统的攻击需要精心设计的解决方案,并且已经提出了几种方法。本文介绍的新系统Virtual Ghost基于编译器检测和运行时检查。这种方法有效地在内核和硬件之间插入了一个小的硬件抽象层,从而提供了内核可用来操作硬件的操作,并为安全应用程序提供了一些可信赖的服务。 Virtual Ghost作为常规库运行,具有与内核相同的特权级别。本文讨论了Virtual Ghost的体系结构方面,并展示了它如何处理操作系统对应用程序的所有类型的攻击。原型的性能分析显示了为应用程序和内核本身提供这种级别的安全性的合理开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号