LibVM: an architecture for shared library sandboxing

被引:3
|
作者
Goonasekera, Nuwan [1 ]
Caelli, William [1 ]
Fidge, Colin [1 ]
机构
[1] Queensland Univ Technol, Brisbane, Qld 4001, Australia
来源
SOFTWARE-PRACTICE & EXPERIENCE | 2015年 / 45卷 / 12期
基金
欧盟地平线“2020”;
关键词
system call inter-positioning; component isolation; dependable systems; information security; hardware virtualization; component software;
D O I
10.1002/spe.2294
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques that address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper, we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shared libraries themselves, while still retaining the benefits of a single address space and also introducing a system call inter-positioning layer that allows complete arbitration over a shared library's functionality. We show how to utilize contemporary hardware-virtualization support towards this end with reasonable performance overheads, and, in the absence of such hardware support, our model can also be implemented using a software-based mechanism. We ensure that our implementation conforms as closely as possible to existing shared library manipulation functions, minimizing the amount of effort needed to apply such isolation to existing programs. Our experimental results show that it is easy to gain immediate benefits in scenarios where the goal is to guard the host application against unintentional programming errors when using shared libraries, as well as in more complex scenarios, where a shared library is suspected of being actively hostile. In both cases, no changes are required to the shared libraries themselves. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1597 / 1617
页数:21
相关论文
共 50 条
  • [21] LIBRARY AND MUSEUM: SHARED IDEAS AND CONCEPTS
    不详
    CULTURE ET MUSEES, 2013, (21):
  • [22] S$A: A Shared Cache Attack that Works Across Cores and Defies VM Sandboxing-and its Application to AES
    Irazoqui, Gorka
    Eisenbarth, Thomas
    Sunar, Berk
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 591 - 604
  • [23] David Chipperfield: an idea of shared architecture for an ideal shared city
    Giordano, Lorenzo
    World Heritage and Degradation: Smart Design, Planning and Technologies, 2016, : 1301 - 1310
  • [24] Introducing the SCSD "shared cache for shared data" multiprocessor architecture
    Mekhiel, NN
    INTERNATIONAL SOCIETY FOR COMPUTERS AND THEIR APPLICATIONS 10TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 1997, : 407 - 411
  • [25] LIBRARY ARCHITECTURE - THE CLEVELAND EXPERIENCE
    GAINES, E
    HUTTNER, M
    PETERS, F
    WILSON LIBRARY BULLETIN, 1982, 56 (08) : 590 - 595
  • [26] The architecture of the new library of Alexandria
    Kapeller, C
    MASSACHUSETTS REVIEW, 2002, 42 (04): : 573 - 584
  • [27] The Alexandria Digital Library architecture
    J. Frew
    M. Freeston
    N. Freitas
    L. Hill
    G. Janée
    K. Lovette
    R. Nideffer
    T. Smith
    Q. Zheng
    International Journal on Digital Libraries, 2000, 2 (4) : 259 - 268
  • [28] THE BURNHAM LIBRARY OF ARCHITECTURE, A HISTORY
    WOOLEVER, M
    ART INSTITUTE OF CHICAGO MUSEUM STUDIES, 1988, 13 (02) : 106 - &
  • [29] BAROQUE MONASTIC LIBRARY ARCHITECTURE
    ACHILLES, R
    JOURNAL OF LIBRARY HISTORY PHILOSOPHY AND COMPARATIVE LIBRARIANSHIP, 1976, 11 (03): : 249 - &
  • [30] System architecture of Library 2.0
    Yang, Xinya
    Wei, Qunyi
    Peng, Xiaodong
    ELECTRONIC LIBRARY, 2009, 27 (02): : 283 - 291