Isolaon - Columbia University

嚜澠sola&on

The con?nement

principle

Original slides were created by Prof. Dan Boneh

1

Running untrusted code

We often need to run buggy/unstrusted code:

每 programs from untrusted Internet sites:

? apps, extensions, plug-ins, codecs for media player

每 exposed applications: pdf viewers, outlook

每 legacy daemons: sendmail, bind

每 honeypots

Goal: if application ※misbehaves§ ? kill it

2

Approach: confinement

Confinement: ensure misbehaving app cannot harm rest of system

? Can be implemented at many levels:

每 Hardware: run application on isolated hw (air gap)

app 1

Network 2

app 2

air gap

network 1

? difficult to manage, expensive

3

Approach: confinement

Confinement: ensure misbehaving app cannot harm rest of system

? Can be implemented at many levels:

每 Virtual machines: isolate OS*s on a single machine

What are some of the drawbacks of this approach?

app1

app2

OS1

OS2

Virtual Machine Monitor (VMM)

4

Approach: confinement

Confinement: ensure misbehaving app cannot harm rest of system

? Can be implemented at many levels:

每 Process: System Call Interposition

Isolate a process in a single operating system

process 1

process 2

Opera&ng System

5

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download