A hardware virtualization-based component sandboxing architecture


Autoria(s): Goonasekera, Nuwan A.; Caelli, William; Fidge, Colin
Data(s)

01/09/2012

Resumo

Modern applications comprise multiple components, such as browser plug-ins, often of unknown provenance and quality. Statistics show that failure of such components accounts for a high percentage of software faults. Enabling isolation of such fine-grained components is therefore necessary to increase the robustness and resilience of security-critical and safety-critical computer systems. In this paper, we evaluate whether such fine-grained components can be sandboxed through the use of the hardware virtualization support available in modern Intel and AMD processors. We compare the performance and functionality of such an approach to two previous software based approaches. The results demonstrate that hardware isolation minimizes the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution's correctness. We also show that our relatively simple implementation has equivalent run-time performance, with overheads of less than 34%, does not require custom tool chains and provides enhanced functionality over software-only approaches, confirming that hardware virtualization technology is a viable mechanism for fine-grained component isolation.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/55624/

Publicador

Academy Publisher

Relação

http://eprints.qut.edu.au/55624/1/prepublication-final-version.pdf

DOI:10.4304/jsw.7.9.2107-2118

Goonasekera, Nuwan A., Caelli, William, & Fidge, Colin (2012) A hardware virtualization-based component sandboxing architecture. Journal of Software, 7(9), pp. 2107-2118.

Direitos

Copyright 2012 please consult the authors

Fonte

School of Electrical Engineering & Computer Science; Institute for Future Environments; Science & Engineering Faculty

Palavras-Chave #080303 Computer System Security #Computer software #Information security #Software components #Module isolation #Operating systems
Tipo

Journal Article