Safe and Secure Subprocess Virtualization in Userspace.

dc.contributor.advisorDautenhahn, Nathanen_US
dc.creatorIm, Bumjinen_US
dc.date.accessioned2021-08-16T19:30:46Zen_US
dc.date.available2021-08-16T19:30:46Zen_US
dc.date.created2021-08en_US
dc.date.issued2021-08-13en_US
dc.date.submittedAugust 2021en_US
dc.date.updated2021-08-16T19:30:46Zen_US
dc.description.abstractCommodity operating systems isolate the application with process boundary, and all the developers develop the applications upon the principle. However, the applications cannot simply trust the process-based isolation. Virtually all the applications link at least one dynamic library on the runtime that the libraries share all the resources in the same process boundary. Unfortunately, the application developers do not fully understand the libraries they are using, and it could even be infeasible for some complex applications. If a single malicious or buggy library is linked to the application, it can breach the entire application due to its process boundary principle. Since the process-based isolation could continue for some time, it could be harder to achieve the least privilege. We propose a new process model, Endokernel, to resolve this issue. Endokernel contains a monitor inside the standard process in the commodity operating system and provides safe isolation between subprocess, maintenance, and the secure interactions between subprocesses. Endokernel also proposes a endoprocess virtualization technique. Utilizing endoprocess virtualization could realize a more  fine-grained least privilege principle in the commodity computing environment. We develop Intravirt as the prototype of Endokernel. Intravirt realizes the Endokernelmodel on Intel CPU and Linux by actively utilizing Intel  Memory Protection Key(MPK) and Control flow Enforcement Technology(CET) as the core security mechanisms. Since MPK and CET are hardware mechanisms, Intravirt aims to secure and high-performance endoprocess virtualization. We then evaluate the security and the performance of Intravirt by measuring microbenchmarks and the actual applications with several use cases for the secure computing environment. Throughout the research, we verify Endokernel is a feasible, lightweight, applicable, and effective security model.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationIm, Bumjin. "Safe and Secure Subprocess Virtualization in Userspace.." (2021) Diss., Rice University. <a href="https://hdl.handle.net/1911/111201">https://hdl.handle.net/1911/111201</a>.en_US
dc.identifier.urihttps://hdl.handle.net/1911/111201en_US
dc.language.isoengen_US
dc.rightsCopyright is held by the author, unless otherwise indicated. Permission to reuse, publish, or reproduce the work beyond the bounds of fair use or other exemptions to copyright law must be obtained from the copyright holder.en_US
dc.subjectComputer Securityen_US
dc.subjectVirtualizationen_US
dc.subjectOperating Systemen_US
dc.subjectMemory Isolationen_US
dc.subjectComputer Systemen_US
dc.titleSafe and Secure Subprocess Virtualization in Userspace.en_US
dc.typeThesisen_US
dc.type.materialTexten_US
thesis.degree.departmentComputer Scienceen_US
thesis.degree.disciplineEngineeringen_US
thesis.degree.grantorRice Universityen_US
thesis.degree.levelDoctoralen_US
thesis.degree.nameDoctor of Philosophyen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
IM-DOCUMENT-2021.pdf
Size:
1.08 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 2 of 2
No Thumbnail Available
Name:
PROQUEST_LICENSE.txt
Size:
5.84 KB
Format:
Plain Text
Description:
No Thumbnail Available
Name:
LICENSE.txt
Size:
2.6 KB
Format:
Plain Text
Description: