Rescuing the End-user systems from Vulnerable Applications using Virtualization Techniques

11/04/2022
by   Vinayak Trivedi, et al.
0

In systems owned by normal end-users, many times security attacks are mounted by sneaking in malicious applications or exploiting existing software vulnerabilities through security non-conforming actions of users. Virtualization approaches can address this problem by providing a quarantine environment for applications, malicious devices, and device drivers, which are mostly used as entry points for security attacks. However, the existing methods to provide quarantine environments using virtualization are not transparent to the user, both in terms of application interface transparency and file system transparency. Further, software configuration level solutions like remote desktops and remote application access mechanisms combined with shared file systems do not meet the user transparency and security requirements. We propose qOS, a VM-based solution combined with certain OS extensions to meet the security requirements of end-point systems owned by normal users, in a transparent and efficient manner. We demonstrate the efficacy of qOS by empirically evaluating the prototype implementation in the Linux+KVM system in terms of efficiency, security, and user transparency.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/22/2017

Contour: A Practical System for Binary Transparency

Transparency is crucial in security-critical applications that rely on a...
research
05/29/2023

Securing Cloud File Systems using Shielded Execution

Cloud file systems offer organizations a scalable and reliable file stor...
research
07/16/2020

Dagger: Towards Efficient RPCs in Cloud Microservices with Near-Memory Reconfigurable NICs

Cloud applications are increasingly relying on hundreds of loosely-coupl...
research
02/16/2022

PhishChain: A Decentralized and Transparent System to Blacklist Phishing URLs

Blacklists are a widely-used Internet security mechanism to protect Inte...
research
05/18/2022

Transparent Serverless execution of Python multiprocessing applications

Access transparency means that both local and remote resources are acces...
research
02/08/2020

On the Insecurities of Mobile D2D File Sharing Applications

With more than 1.3 Billion in the cumulative number of downloads reporte...
research
11/20/2017

Software Distribution Transparency and Auditability

A large user base relies on software updates provided through package ma...

Please sign up or login with your details

Forgot password? Click here to reset