Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating

被引:0
|
作者
Kuo H.-C. [1 ]
Chen J. [1 ]
Mohan S. [1 ]
Xu T. [1 ]
机构
[1] University of Illinois at Urbana-Champaign, Champaign, IL
来源
Performance Evaluation Review | 2020年 / 48卷 / 01期
关键词
D O I
10.1145/3393691.3394215
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a study on the practicality of operating system (OS) kernel debloating-reducing kernel code that is not needed by the target applications-in real-world systems. Despite their significant benefits regarding security (attack surface reduction) and performance (fast boot times and reduced memory footprints), the state-of-the-art OS kernel debloating techniques are seldom adopted in practice, especially in production systems. We identify the limitations of existing kernel debloating techniques that hinder their practical adoption, including both accidental and essential limitations. To understand these limitations, we build an advanced debloating framework named Cozart which enables us to conduct a number of experiments on different types of OS kernels (including Linux and the L4 microkernel) with a wide variety of applications (including HTTPD, Memcached, MySQL, NGINX, PHP and Redis). Our experimental results reveal the challenges and opportunities towards making kernel debloating techniques practical for realworld systems. The main goal of this paper is to share these insights and our experiences to shed light on addressing the limitations of kernel debloating in future research and development efforts. © 2020 Copyright is held by the owner/author(s).
引用
收藏
页码:87 / 88
页数:1
相关论文
共 50 条
  • [21] DIPS STANDARDIZED OPERATING SYSTEM DIPS 104 OS
    YASUDA, K
    KAWANOBE, K
    TSURUHO, S
    KOHMURA, M
    JAPAN TELECOMMUNICATIONS REVIEW, 1981, 23 (04): : 375 - 382
  • [22] OPERATING SYSTEM INTEGRITY IN OS-VS2
    MCPHEE, WS
    IBM SYSTEMS JOURNAL, 1974, 13 (03) : 230 - 252
  • [23] An Evaluation of Chromium OS:the Next Generation Operating System
    Meng Wang
    Rich Wolski
    计算机教育, 2013, (05) : 93 - 102
  • [24] Memory Forensics and the Macintosh OS X Operating System
    Leopard, Charles B.
    Rowe, Neil C.
    McCarrin, Michael R.
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2017, 2018, 216 : 175 - 180
  • [25] KBT: Operating system kernel level binary translation system
    Jiang, Haitao
    Xu, Yun
    Liao, Yin
    Jin, Guojie
    Chen, Guoliang
    Journal of Software, 2013, 8 (06) : 1275 - 1280
  • [26] Configuration and coding of cache in VxWorks operating system
    Shen, Wei
    Yu, Xiao-Hua
    Dong, Lei
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2006, 30 (06): : 755 - 759
  • [27] Malicious software detection in operating system (OS) for mobile devices (the case of Android OS)
    Zhernakov, S. V.
    Gavrilov, G. N.
    2016 13TH INTERNATIONAL SCIENTIFIC-TECHNICAL CONFERENCE ON ACTUAL PROBLEMS OF ELECTRONIC INSTRUMENT ENGINEERING (APEIE), VOL 2, 2016, : 163 - 165
  • [28] CONFIGURATION MANAGEMENT IN THE NEXUS DISTRIBUTED OPERATING SYSTEM
    TRIPATHI, A
    KARNIK, NM
    KONERU, SP
    NOCK, C
    TEWARI, R
    DAY, K
    NOONAN, T
    CONCURRENCY-PRACTICE AND EXPERIENCE, 1994, 6 (04): : 325 - 338
  • [29] Study and implementation of a multilevel file system in security kernel of OS
    Liu, Wen-Qing
    Qing, Si-Han
    Liu, Hai-Feng
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2002, 30 (05): : 763 - 765
  • [30] Nested Kernel: An Operating System Architecture for Intra-Kernel Privilege Separation
    Dautenhahn, Nathan
    Kasampalis, Theodoros
    Dietz, Will
    Criswell, John
    Adve, Vikram
    ACM SIGPLAN NOTICES, 2015, 50 (04) : 191 - 206