Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments 2020
DOI: 10.1145/3381052.3381326
|View full text |Cite
|
Sign up to set email alerts
|

Intra-unikernel isolation with Intel memory protection keys

Abstract: Unikernels are minimal, single-purpose virtual machines. This new operating system model promises numerous benefits within many application domains in terms of lightweightness, performance, and security. Although the isolation between unikernels is generally recognized as strong, there is no isolation within a unikernel itself. This is due to the use of a single, unprotected address space, a basic principle of unikernels that provide their lightweightness and performance benefits. In this paper, we propose a n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(16 citation statements)
references
References 29 publications
0
16
0
Order By: Relevance
“…• Single protection level: There should be no user-/kernel-space separation to avoid costly processor mode switches. This does not preclude compartmentalization (e.g., of micro-libraries), which can be achieved at reasonable cost [69]. • Static linking: Enable compiler features, e.g., Dead…”
Section: Design Principles and Solution Spacementioning
confidence: 99%
“…• Single protection level: There should be no user-/kernel-space separation to avoid costly processor mode switches. This does not preclude compartmentalization (e.g., of micro-libraries), which can be achieved at reasonable cost [69]. • Static linking: Enable compiler features, e.g., Dead…”
Section: Design Principles and Solution Spacementioning
confidence: 99%
“…More recently, OSes providing security through software isolation brought by safe languages [7,13,25,36,39] have been proposed. In SASOSes, isolation has been provided with traditional page tables [10,23,32] and recently through intra-address-space hardware isolation mechanisms [34,42,45,47]. Formal verification offers deterministic security guarantees, but has trouble scaling to modern OSes' large codebases [28,29].…”
Section: Related Workmentioning
confidence: 99%
“…Second, hardware isolation, SH and runtime property checking can be used to check that certain correctness properties hold (e.g. when specified as pre and post conditions), thus relieving the user from needing to prove code correctness statically against a specification [47]. Third, both software verification and protection domains can be used to ensure (a form of) control-flow integrity between components, guaranteeing that code execution starts only at well-defined entry points, without needing software runtime checks [53].…”
Section: Introductionmentioning
confidence: 99%
“…Many other compartmentalization abstractions can be used for platforms that do not support hardware capabilities, relying on various isolation mechanisms. These can be process-based isolation leveraging page tables [36], [37]; VM-based isolation using hardware-assisted virtualization [38], [39]; trusted execution environments [40], [41] and other ISA extensions such as Intel MPK [42]- [45]; and finally software-only solutions such as SFI [46]. These techniques offer various security/performance trade-offs and generally require a particular porting effort to manage data shared between compartments.…”
Section: A Isolating Librariesmentioning
confidence: 99%