Proceedings 13th Annual Computer Security Applications Conference
DOI: 10.1109/csac.1997.646188
|View full text |Cite
|
Sign up to set email alerts
|

Using kernel hypervisors to secure applications

Abstract: This paper describes an approach for selectively controlling COTS components to provide robustness and security. Using the concept of a loadable module, "kernel hypewisors" have been implemented on a Linux kernel. These kernel hypervisors provide unbypassable security wrappers for application speciJic security requirements and can be used to provide replication services as well.A framework has been developed based on a master kernel hypewisol; whose job is to coordinate installation and removal of individual c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 3 publications
0
17
0
Order By: Relevance
“…A common approach used to add security to a system is to intercept service requests or to otherwise interpose a layer of security code between all applications and the operating system (e.g., Kernel Hypervisors [37], SPIN [20]), or between particular applications or sets of applications (e.g., L3/L4 [30], Lava [22], KeySAFE [28]). This may be done in capability systems or non-capability systems, and when applied to an operating system the security layer may lie within the operating system itself (as in Spring [36]) or in a component outside of the operating system to which all requests are redirected (as in Janus [17]).…”
Section: Intercepting Requestsmentioning
confidence: 99%
“…A common approach used to add security to a system is to intercept service requests or to otherwise interpose a layer of security code between all applications and the operating system (e.g., Kernel Hypervisors [37], SPIN [20]), or between particular applications or sets of applications (e.g., L3/L4 [30], Lava [22], KeySAFE [28]). This may be done in capability systems or non-capability systems, and when applied to an operating system the security layer may lie within the operating system itself (as in Spring [36]) or in a component outside of the operating system to which all requests are redirected (as in Janus [17]).…”
Section: Intercepting Requestsmentioning
confidence: 99%
“…To accomplish this, they rely on ptrace (2), the /proc file system, and/or special shared libraries. Another category of systems, such as Tron [17], SubDomain [23] and others [29,32,59,44,60,41,51], go a step further. They intercept system calls inside the kernel, and use policy engines to decide whether to permit the call or not.…”
Section: Safe Languages and Compilersmentioning
confidence: 99%
“…To accomplish this they use ptrace(2) and the /proc file system, which allows their tracer to register a call-back that is executed whenever the tracee issues a system call. Other similar systems include Consh [Alexandrov et al, 1998], Mediating Connectors [Balzer and Goldman, 1999], SubDomain [Cowan et al, 2000] and others [Fraser et al, 1999, Ghormley et al, 1998, Walker et al, 1996, Mitchem et al, 1997.…”
Section: Related Workmentioning
confidence: 99%