...
首页> 外文期刊>Dependable and Secure Computing, IEEE Transactions on >Resilient Authenticated Execution of Critical Applications in Untrusted Environments
【24h】

Resilient Authenticated Execution of Critical Applications in Untrusted Environments

机译:在不受信任的环境中对关键应用程序进行有弹性的身份验证执行

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Modern computer systems are built on a foundation of software components from a variety of vendors. While critical applications may undergo extensive testing and evaluation procedures, the heterogeneity of software sources threatens the integrity of the execution environment for these trusted programs. For instance, if an attacker can combine an application exploit with a privilege escalation vulnerability, the operating system (OS) can become corrupted. Alternatively, a malicious or faulty device driver running with kernel privileges could threaten the application. While the importance of ensuring application integrity has been studied in prior work, proposed solutions immediately terminate the application once corruption is detected. Although, this approach is sufficient for some cases, it is undesirable for many critical applications. In order to overcome this shortcoming, we have explored techniques for leveraging a trusted virtual machine monitor (VMM) to observe the application and potentially repair damage that occurs. In this paper, we describe our system design, which leverages efficient coding and authentication schemes, and we present the details of our prototype implementation to quantify the overhead of our approach. Our work shows that it is feasible to build a resilient execution environment, even in the presence of a corrupted OS kernel, with a reasonable amount of storage and performance overhead.
机译:现代计算机系统以各种供应商的软件组件为基础。尽管关键应用程序可能会经过广泛的测试和评估程序,但是软件源的异构性威胁了这些受信任程序的执行环境的完整性。例如,如果攻击者可以将应用程序利用与特权升级漏洞结合在一起,则操作系统(OS)可能会损坏。或者,以内核特权运行的恶意或故障设备驱动程序可能威胁应用程序。尽管在先前的工作中已经研究了确保应用程序完整性的重要性,但是一旦发现损坏,建议的解决方案将立即终止应用程序。尽管此方法在某些情况下已足够,但对于许多关键应用程序却是不希望的。为了克服此缺点,我们探索了利用受信任的虚拟机监视器(VMM)来观察应用程序并修复可能发生的损坏的技术。在本文中,我们描述了利用高效编码和身份验证方案的系统设计,并提供了原型实现的详细信息以量化该方法的开销。我们的工作表明,即使在OS内核损坏的情况下,构建具有弹性的执行环境也是可行的,并且具有合理的存储量和性能开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号