slide1
Download
Skip this Video
Download Presentation
CS 6501- Overshadow Response Michael Deighan (9/1/09)

Loading in 2 Seconds...

play fullscreen
1 / 6

CS 6501- Overshadow Response Michael Deighan (9/1/09) - PowerPoint PPT Presentation


  • 117 Views
  • Uploaded on

CS 6501- Overshadow Response Michael Deighan (9/1/09). Goals application authenticity execution integrity data privacy Options Overshadow extension CHAOS LOKI INVISIOS. Overshadow Extension. Towards Application Security on Untrusted Operating Systems Dan R. K. Ports and Tal Garfinkel.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' CS 6501- Overshadow Response Michael Deighan (9/1/09)' - cahil


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

CS 6501- Overshadow ResponseMichael Deighan (9/1/09)

  • Goals
    • application authenticity
    • execution integrity
    • data privacy
  • Options
    • Overshadow extension
    • CHAOS
    • LOKI
    • INVISIOS
slide2

Overshadow Extension

Towards Application Security on Untrusted Operating Systems

Dan R. K. Ports and Tal Garfinkel

  • Use shim to protect:
  • file system
  • inter-process communications
  • process management
  • time and randomness
  • I/O and trusted paths
  • identity management
  • error handling

http://www.usenix.org/events/hotsec08/tech/full_papers/ports/ports.pdf

slide3

CHAOS

Tamper-Resistant Execution in an Untrusted Operating System Using a Virtual Machine Monitor

Haibo Chen, Fengzhe Zhang, Cheng Chen, Ziye Yang, Rong Chen, Binyu Zang

http://ppi.fudan.edu.cn/system/publications/paper/chaos-ppi-tr.pdf

slide4

LOKI

Hardware Enforcement of Application Security Policies

Using Tagged Memory

Nickolai Zeldovich, Hari Kannan, Michael Dalton, and Christos Kozyrakis

http://www.usenix.org/events/osdi08/tech/full_papers/zeldovich/zeldovich_html/

slide5

INVISIOS

INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment

Divya Arora, Najwa Aaraj, Anand Raghunathan, Niraj K. Jha

http://www.princeton.edu/~jha/files/CE-J09-001.pdf

discussion
Discussion
  • What are the pros and cons of each option?
  • How will each affect application development?
  • Which option deserves further investigation?
ad