DocumentCode
2415649
Title
Isolated program execution: an application transparent approach for executing untrusted programs
Author
Liang, Zhenkai ; Venkatakrishnan, V.N. ; Sekar, R.
Author_Institution
Dept. of Comput. Sci., Stony Brook Univ., NY, USA
fYear
2003
fDate
8-12 Dec. 2003
Firstpage
182
Lastpage
191
Abstract
We present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting file operations made by untrusted processes, and redirecting any change operations to a "modification cache" that is invisible to other processes in the system. File read operations performed by the untrusted process are also correspondingly modified, so that the process has a consistent view of system state that incorporates the contents of the file system as well as the modification cache. On termination of the untrusted process, its user is presented with a concise summary of the files modified by the process. Additionally, the user can inspect these files using various software utilities (e.g., helper applications to view multimedia files) to determine if the modifications are acceptable. The user then has the option to commit these modifications, or simply discard them. Essentially, our approach provides "play" and "rewind" buttons for running untrusted software. Key benefits of our approach are that it requires no changes to the untrusted programs (to be isolated) or the underlying operating system; it cannot be subverted by malicious programs; and it achieves these benefits with acceptable runtime overheads. We describe a prototype implementation of this system for Linux called Alcatraz and discuss its performance and effectiveness.
Keywords
file organisation; operating systems (computers); security of data; utility programs; Alcatraz; Linux; file read operation; helper application; intercepting file operation; isolated program execution; modification cache; multimedia file; operating system; software utility; untrusted program; Application software; Computer science; Databases; File systems; Object detection; Operating systems; Prototypes; Runtime; Security; Software prototyping;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 2003. Proceedings. 19th Annual
Print_ISBN
0-7695-2041-3
Type
conf
DOI
10.1109/CSAC.2003.1254323
Filename
1254323
Link To Document