Virtual ghost: Protecting applications from hostile operating systems

J Criswell, N Dautenhahn, V Adve - ACM SIGARCH Computer …, 2014 - dl.acm.org
ACM SIGARCH Computer Architecture News, 2014dl.acm.org
Applications that process sensitive data can be carefully designed and validated to be
difficult to attack, but they are usually run on monolithic, commodity operating systems, which
may be less secure. An OS compromise gives the attacker complete access to all of an
application's data, regardless of how well the application is built. We propose a new system,
Virtual Ghost, that protects applications from a compromised or even hostile OS. Virtual
Ghost is the first system to do so by combining compiler instrumentation and run-time checks …
Applications that process sensitive data can be carefully designed and validated to be difficult to attack, but they are usually run on monolithic, commodity operating systems, which may be less secure. An OS compromise gives the attacker complete access to all of an application's data, regardless of how well the application is built. We propose a new system, Virtual Ghost, that protects applications from a compromised or even hostile OS. Virtual Ghost is the first system to do so by combining compiler instrumentation and run-time checks on operating system code, which it uses to create ghost memory that the operating system cannot read or write. Virtual Ghost interposes a thin hardware abstraction layer between the kernel and the hardware that provides a set of operations that the kernel must use to manipulate hardware, and provides a few trusted services for secure applications such as ghost memory management, encryption and signing services, and key management. Unlike previous solutions, Virtual Ghost does not use a higher privilege level than the kernel.
Virtual Ghost performs well compared to previous approaches; it outperforms InkTag on five out of seven of the LMBench microbenchmarks with improvements between 1.3x and 14.3x. For network downloads, Virtual Ghost experiences a 45% reduction in bandwidth at most for small files and nearly no reduction in bandwidth for large files and web traffic. An application we modified to use ghost memory shows a maximum additional overhead of 5% due to the Virtual Ghost protections. We also demonstrate Virtual Ghost's efficacy by showing how it defeats sophisticated rootkit attacks.
ACM Digital Library
Showing the best result for this search. See all results