LibVM: an architecture for shared library sandboxing

被引:3
|
作者
Goonasekera, Nuwan [1 ]
Caelli, William [1 ]
Fidge, Colin [1 ]
机构
[1] Queensland Univ Technol, Brisbane, Qld 4001, Australia
来源
SOFTWARE-PRACTICE & EXPERIENCE | 2015年 / 45卷 / 12期
基金
欧盟地平线“2020”;
关键词
system call inter-positioning; component isolation; dependable systems; information security; hardware virtualization; component software;
D O I
10.1002/spe.2294
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques that address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper, we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shared libraries themselves, while still retaining the benefits of a single address space and also introducing a system call inter-positioning layer that allows complete arbitration over a shared library's functionality. We show how to utilize contemporary hardware-virtualization support towards this end with reasonable performance overheads, and, in the absence of such hardware support, our model can also be implemented using a software-based mechanism. We ensure that our implementation conforms as closely as possible to existing shared library manipulation functions, minimizing the amount of effort needed to apply such isolation to existing programs. Our experimental results show that it is easy to gain immediate benefits in scenarios where the goal is to guard the host application against unintentional programming errors when using shared libraries, as well as in more complex scenarios, where a shared library is suspected of being actively hostile. In both cases, no changes are required to the shared libraries themselves. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1597 / 1617
页数:21
相关论文
共 50 条
  • [1] A hardware virtualization based component sandboxing architecture
    Goonasekera, N. (nuwan.goonasekera@student.qut.edu), 1600, Academy Publisher (07):
  • [2] SandBoxer: A Self-Contained Sensor Architecture for Sandboxing the Industrial Internet of Things
    Hassan, Galal
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [3] Library Architecture
    Carlson, Henry J.
    LIBRARY JOURNAL, 1923, 48 (22) : 1049 - 1051
  • [4] Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture
    Zhang, Jingci
    Zheng, Jun
    Zhang, Zheng
    Chen, Tian
    Qiu, Kefan
    Zhang, Quanxin
    Li, Yuanzhang
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 104 - 123
  • [5] Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture
    Zhang, Jingci
    Zheng, Jun
    Zhang, Zheng
    Chen, Tian
    Qiu, Kefan
    Zhang, Quanxin
    Li, Yuanzhang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 11167 - 11187
  • [6] Architecture as a Shared Hallucination
    Booch, Grady
    IEEE SOFTWARE, 2010, 27 (01) : 95 - +
  • [7] The planetary shared sample library
    DiGregorio, Barry E.
    Spectroscopy (Santa Monica), 2003, 18 (03)
  • [8] SHARED MOBILE LIBRARY COLLECTIONS
    MCLEAN, EB
    COLLEGE & RESEARCH LIBRARIES, 1968, 29 (01): : 27 - 29
  • [9] Library Architecture at Yale
    Bunch, Antonia J.
    LIBRARY & INFORMATION HISTORY, 2010, 26 (03) : 227 - +
  • [10] LIBRARY TECHNOLOGY AND ARCHITECTURE
    FORMAN, S
    LIBRARY JOURNAL, 1968, 93 (12) : 2453 - 2455