Please use this identifier to cite or link to this item:
https://doi.org/10.1145/1455526.1455527
DC Field | Value | |
---|---|---|
dc.title | Alcatraz: An isolated environment for experimenting with untrusted software | |
dc.contributor.author | Liang, Z. | |
dc.contributor.author | Sun, W. | |
dc.contributor.author | Venkatakrishnan, V.N. | |
dc.contributor.author | Sekar, R. | |
dc.date.accessioned | 2013-07-04T07:31:20Z | |
dc.date.available | 2013-07-04T07:31:20Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Liang, Z., Sun, W., Venkatakrishnan, V.N., Sekar, R. (2009). Alcatraz: An isolated environment for experimenting with untrusted software. ACM Transactions on Information and System Security 12 (3). ScholarBank@NUS Repository. https://doi.org/10.1145/1455526.1455527 | |
dc.identifier.issn | 10949224 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/38984 | |
dc.description.abstract | In this article, we present an approach for realizing a safe execution environment (SEE) that enables users to try out new software (or configuration changes to existing software) without the fear of damaging the system in any manner. A key property of our SEE is that it faithfully reproduces the behavior of applications, as if they were running natively on the underlying (host) operating system. This is accomplished via one-way isolation: processes running within the SEE are given read-access to the environment provided by the host OS, but their write operations are prevented from escaping outside the SEE. As a result, SEE processes cannot impact the behavior of host OS processes, or the integrity of data on the host OS. SEEs support a wide range of tasks, including: study of malicious code, controlled execution of untrusted software, experimentation with software configuration changes, testing of software patches, and so on. It provides a convenient way for users to inspect system changes made within the SEE. If these changes are not accepted, they can be rolled back at the click of a button. Otherwise, the changes can be committed so as to become visible outside the SEE. We provide consistency criteria that ensure semantic consistency of the committed results. We develop two different implementation approaches, one in user-land and the other in the OS kernel, for realizing a safe-execution environment. Our implementation results show that most software, including fairly complex server and client applications, can run successfully within our SEEs. It introduces low performance overheads, typically below 10 percent. © 2009 ACM. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1455526.1455527 | |
dc.source | Scopus | |
dc.subject | Isolation | |
dc.subject | One-way isolation | |
dc.type | Article | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1145/1455526.1455527 | |
dc.description.sourcetitle | ACM Transactions on Information and System Security | |
dc.description.volume | 12 | |
dc.description.issue | 3 | |
dc.identifier.isiut | 000263100100001 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.