DocumentCode :
1464186
Title :
Resilient Authenticated Execution of Critical Applications in Untrusted Environments
Author :
Kirkpatrick, Michael S. ; Ghinita, Gabriel ; Bertino, Elisa
Author_Institution :
Dept. of Comput. Sci., James Madison Univ., Harrisonburg, VA, USA
Volume :
9
Issue :
4
fYear :
2012
Firstpage :
597
Lastpage :
609
Abstract :
Modern computer systems are built on a foundation of software components from a variety of vendors. While critical applications may undergo extensive testing and evaluation procedures, the heterogeneity of software sources threatens the integrity of the execution environment for these trusted programs. For instance, if an attacker can combine an application exploit with a privilege escalation vulnerability, the operating system (OS) can become corrupted. Alternatively, a malicious or faulty device driver running with kernel privileges could threaten the application. While the importance of ensuring application integrity has been studied in prior work, proposed solutions immediately terminate the application once corruption is detected. Although, this approach is sufficient for some cases, it is undesirable for many critical applications. In order to overcome this shortcoming, we have explored techniques for leveraging a trusted virtual machine monitor (VMM) to observe the application and potentially repair damage that occurs. In this paper, we describe our system design, which leverages efficient coding and authentication schemes, and we present the details of our prototype implementation to quantify the overhead of our approach. Our work shows that it is feasible to build a resilient execution environment, even in the presence of a corrupted OS kernel, with a reasonable amount of storage and performance overhead.
Keywords :
operating system kernels; security of data; virtual machines; OS; OS kernel; VMM; application integrity; authentication schemes; coding schemes; critical applications; faulty device driver; malicious device driver; operating system; privilege escalation vulnerability; resilient authenticated execution; software components; software sources; trusted virtual machine monitor; untrusted environments; Checkpointing; Decoding; Error correction codes; Image reconstruction; Kernel; Security; Switches; Operating systems; security; virtual machine monitors.;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2012.25
Filename :
6165312
Link To Document :
بازگشت