Proceedings of the 9th Workshop on Programming Languages and Operating Systems 2017
DOI: 10.1145/3144555.3144563
|View full text |Cite
|
Sign up to set email alerts
|

Towards Fine-grained, Automated Application Compartmentalization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Second, SecureCells does not aim to compartmentalize existing software with zero-modifications. While automated isolation techniques provide a crucial first step towards compartmentalized programs [34], [35], [36], security-critical software requires refactoring to fully realize the benefits of proper compartmentalization. Finally, related works target compatibility with legacy hardware or existing or upcoming software/hardware mechanisms and abstractions for isolation.…”
Section: Alternate Visions For Compartmentalizationmentioning
confidence: 99%
“…Second, SecureCells does not aim to compartmentalize existing software with zero-modifications. While automated isolation techniques provide a crucial first step towards compartmentalized programs [34], [35], [36], security-critical software requires refactoring to fully realize the benefits of proper compartmentalization. Finally, related works target compatibility with legacy hardware or existing or upcoming software/hardware mechanisms and abstractions for isolation.…”
Section: Alternate Visions For Compartmentalizationmentioning
confidence: 99%
“…Partitioning an application into compartments and defining which resources they can access is an open problem and it is orthogonal to this paper. Previous work focuses on identifying suitable isolation boundaries in applications and OSes using automatic and semiautomatic (e.g., annotations) techniques [9,14,33,35,42,52,62,72,73,84]. However, completely automating compartmentalization of existing software is still challenging.…”
Section: Signal Context Attacks a Concurrent Work With Oursmentioning
confidence: 99%
“…Modules-development-time constructs usually glued together without a full understanding of their internals-are represented as vertices. The resulting dependencies, which in modern applications can be thousands [85], are depicted as edges connecting importing parent modules with imported child modules.…”
Section: Background and Motivationmentioning
confidence: 99%
“…More rarely, companies rewrite entire systems (e.g., Twitter's Ruby-to-Scala rewrite [55]), a process that is notoriously difficult under schedule constraints and competitive pressures [80,93]. The manual effort is expensive, and can introduce new bugs, cascading changes, or regressions of previously fixed performance issues, especially since software today makes extensive use of third-party modules [85]. Could the process of identifying bottlenecks, generating a distributed version of the system, and scaling it out at runtime be significantly automated?…”
Section: Introductionmentioning
confidence: 99%