Title :
Isolated program execution: an application transparent approach for executing untrusted programs
Author :
Liang, Zhenkai ; Venkatakrishnan, V.N. ; Sekar, R.
Author_Institution :
Dept. of Comput. Sci., Stony Brook Univ., NY, USA
Abstract :
We present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting file operations made by untrusted processes, and redirecting any change operations to a "modification cache" that is invisible to other processes in the system. File read operations performed by the untrusted process are also correspondingly modified, so that the process has a consistent view of system state that incorporates the contents of the file system as well as the modification cache. On termination of the untrusted process, its user is presented with a concise summary of the files modified by the process. Additionally, the user can inspect these files using various software utilities (e.g., helper applications to view multimedia files) to determine if the modifications are acceptable. The user then has the option to commit these modifications, or simply discard them. Essentially, our approach provides "play" and "rewind" buttons for running untrusted software. Key benefits of our approach are that it requires no changes to the untrusted programs (to be isolated) or the underlying operating system; it cannot be subverted by malicious programs; and it achieves these benefits with acceptable runtime overheads. We describe a prototype implementation of this system for Linux called Alcatraz and discuss its performance and effectiveness.
Keywords :
file organisation; operating systems (computers); security of data; utility programs; Alcatraz; Linux; file read operation; helper application; intercepting file operation; isolated program execution; modification cache; multimedia file; operating system; software utility; untrusted program; Application software; Computer science; Databases; File systems; Object detection; Operating systems; Prototypes; Runtime; Security; Software prototyping;
Conference_Titel :
Computer Security Applications Conference, 2003. Proceedings. 19th Annual
Print_ISBN :
0-7695-2041-3
DOI :
10.1109/CSAC.2003.1254323