CS 6501- Overshadow Response
Download
1 / 6

CS 6501- Overshadow Response Michael Deighan (9/1/09) - PowerPoint PPT Presentation


  • 116 Views
  • Uploaded on

CS 6501- Overshadow Response Michael Deighan (9/1/09). Goals application authenticity execution integrity data privacy Options Overshadow extension CHAOS LOKI INVISIOS. Overshadow Extension. Towards Application Security on Untrusted Operating Systems Dan R. K. Ports and Tal Garfinkel.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' CS 6501- Overshadow Response Michael Deighan (9/1/09)' - cahil


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

CS 6501- Overshadow ResponseMichael Deighan (9/1/09)

  • Goals

    • application authenticity

    • execution integrity

    • data privacy

  • Options

    • Overshadow extension

    • CHAOS

    • LOKI

    • INVISIOS


Overshadow Extension

Towards Application Security on Untrusted Operating Systems

Dan R. K. Ports and Tal Garfinkel

  • Use shim to protect:

  • file system

  • inter-process communications

  • process management

  • time and randomness

  • I/O and trusted paths

  • identity management

  • error handling

http://www.usenix.org/events/hotsec08/tech/full_papers/ports/ports.pdf


CHAOS

Tamper-Resistant Execution in an Untrusted Operating System Using a Virtual Machine Monitor

Haibo Chen, Fengzhe Zhang, Cheng Chen, Ziye Yang, Rong Chen, Binyu Zang

http://ppi.fudan.edu.cn/system/publications/paper/chaos-ppi-tr.pdf


LOKI

Hardware Enforcement of Application Security Policies

Using Tagged Memory

Nickolai Zeldovich, Hari Kannan, Michael Dalton, and Christos Kozyrakis

http://www.usenix.org/events/osdi08/tech/full_papers/zeldovich/zeldovich_html/


INVISIOS

INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment

Divya Arora, Najwa Aaraj, Anand Raghunathan, Niraj K. Jha

http://www.princeton.edu/~jha/files/CE-J09-001.pdf


Discussion
Discussion

  • What are the pros and cons of each option?

  • How will each affect application development?

  • Which option deserves further investigation?


ad