Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security 2015
DOI: 10.1145/2714576.2714618
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Virtualization-Based Application Protection Against Untrusted Operating System

Abstract: Commodity monolithic operating systems are abundant with vulnerabilities that lead to rootkit attacks. Once an operating system is subverted, the data and execution of user applications are fully exposed to the adversary, regardless whether they are designed and implemented with security considerations. Existing application protection schemes have various drawbacks, such as high performance overhead, large Trusted Computing Base (TCB), or hardware modification. In this paper, we present the design and implemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Cheng et al [57] present a hypervisor-based approach, AppShield, for protecting data, code and execution integrity of an application against OS level malware attacks. In this design, hypervisor separates the address space for application to be protected from the rest of the applications.…”
Section: Mandatory Access Controlmentioning
confidence: 99%
See 2 more Smart Citations
“…Cheng et al [57] present a hypervisor-based approach, AppShield, for protecting data, code and execution integrity of an application against OS level malware attacks. In this design, hypervisor separates the address space for application to be protected from the rest of the applications.…”
Section: Mandatory Access Controlmentioning
confidence: 99%
“…Shu et al [55] In use An approach for secure file sharing where access is controlled through proxy server which utilizes the keys stored with each file Denial of Service attack, Rollback attack, Passive monitoring, Timing channel attack Cheng et al [57] In use Approach for protection of application's data from kernel level attacks where hypervisor provides the services of authorizing requests from kernel.…”
Section: Malware Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The past years have seen a significant effort in the design of systems that shield applications from the operating system [19], [18], [49], [42], [27], [20], [22], [35], [10]. Such shielding systems typically use trusted hardware or a hypervisor to prevent the operating system from reading or writing to an application's memory and from directly tampering with its execution.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, for example, when the kernel wishes to modify a page table entry, it calls a dedicated inner function, the SMC call transparently reroutes the control flow to RKP running within the TrustZone which performs the operation and returns control to the kernel. This mode of operation resembles hardware-based paravirtualization [30], in which the TrustZone plays the role of the hypervisor and the kernel calls to it to perform key tasks in a secure manner. A similar mechanism to RKP, but with less features is presented in Sprobes [39].…”
Section: Timamentioning
confidence: 99%