[Cryptography] Open Source Sandboxes to Enforce Security on Proprietary Code?
Jerry Leichter
leichter at lrw.com
Sun Aug 24 07:36:02 EDT 2014
A fascinating bit of work on the inverse problem: Running an application securely under a hostile OS: http://sva.cs.illinois.edu/pubs/VirtualGhost-ASPLOS-2014.pdf
Basic idea: Use virtualization techniques on a process-by-process level. The hypervisor considers every page of memory to be in of two states: Accessible to a particular process; accessible to the OS. On the transition from process to OS, encrypt and checksum it; on the transition back, verify and decrypt. So the OS can screw up a process - but can't see any of its actual data.
There's obviously much more to it than that, but it's really clever stuff. In a way, you can think of this as taking the very old idea of the security kernel into the modern era by completely divorcing it from the OS.
-- Jerry
More information about the cryptography
mailing list