2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks 2014
DOI: 10.1109/dsn.2014.52
|View full text |Cite
|
Sign up to set email alerts
|

FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine

Abstract: Kernel minimization has already been established as a practical approach to reducing the trusted computing base. Existing solutions have largely focused on whole-system profiling -generating a globally minimum kernel image that is being shared by all applications. However, since different applications use only part of the kernel's code base, the minimized kernel still includes an unnecessarily large attack surface. Furthermore, once the static minimized kernel is generated, it is not flexible enough to adapt t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 22 publications
(28 citation statements)
references
References 18 publications
(13 reference statements)
0
28
0
Order By: Relevance
“…Besides these off-line kernel reduction works, kRazor [43] is an OS mechanism that restricts accesses to kernel code from user-level applications based on run-time profiling of workloads. FACE-CHANGE [36] identifies the minimized kernel memory for each application based on runtime profiling and projects the memory while the application is in production using virtualization techniques. All these works on monolithic kernels have motivated us to apply the principle of least privilege to real-time MCS, which was previously absent due to practical hardware and performance constraints.…”
Section: Related Workmentioning
confidence: 99%
“…Besides these off-line kernel reduction works, kRazor [43] is an OS mechanism that restricts accesses to kernel code from user-level applications based on run-time profiling of workloads. FACE-CHANGE [36] identifies the minimized kernel memory for each application based on runtime profiling and projects the memory while the application is in production using virtualization techniques. All these works on monolithic kernels have motivated us to apply the principle of least privilege to real-time MCS, which was previously absent due to practical hardware and performance constraints.…”
Section: Related Workmentioning
confidence: 99%
“…In the future, CHANCEL can automate shared data initialization using static data-flow analysis to determine shared objects and files, without developer annotation, similar to an existing SGX automated compartmentalization scheme [55]. Furthermore, if the resulting analysis is too imprecise, it can be improved through dynamic analysis with a representative workload [56,57]. Importantly, developer-assisted identification does not pose security threats.…”
Section: Shared Data Initializationmentioning
confidence: 99%
“…Different from existing research efforts on side/covert channels, we discover a system-wide information leakage in the container cloud settings and design a new methodology to quantitatively assess the capacity of leakage channels for co-residence detection. In addition, compared to the research on minimizing the kernel attack surface for VMs [20], we proposed a two-stage defense mechanism to minimize the space for information leakages and power attacks on container clouds.…”
Section: Cloud Security and Side/covert Channel Attacksmentioning
confidence: 99%