Abstract :
Malware such as Trojan horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today´s commodity operating systems. In this paper, we present the design and implementation of Nitpicker - an extremely minimized secure graphical user interface that addresses these problems while retaining compatibility to legacy operating systems. We describe our approach of kernelizing the window server and present the deployed security mechanisms and protocols. Our implementation comprises only 1,500 lines of code while supporting commodity software such as X11 applications alongside protected graphical security applications. We discuss key techniques such as client-side window handling, a new floating-labels mechanism, drag-and-drop, and denial-of-service-preventing resource management. Furthermore, we present an application scenario to evaluate the feasibility, performance, and usability of our approach
Keywords :
graphical user interfaces; operating system kernels; security of data; software maintenance; Nitpicker; Trojan horses; X11 application; client-side window handling; denial-of-service; floating-label mechanism; graphical security application; graphical user interface; malware; operating system; resource management; secure GUI; security protocol; spyware; window server kernelizing; Application software; Communication system security; Computer crime; Graphical user interfaces; Invasive software; Isolation technology; Mice; Operating systems; Protocols; Resource management;