Secure Virtual Architecture: A Novel Foundation for Operating System Security

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=3qG5eTf-fnA



Duration: 1:17:35
162 views
1


This talk describes Secure Virtual Architecture (SVA), an efficient and robust approach to provide a safe execution environment for an entire commodity operating system, such as Linux and its hosted applications. SVA defines a simple, but complete, virtual architecture, implemented via a compiler-based virtual machine. The SVA approach is efficient and requires relatively few changes to the guest OS because it is based on a set of novel, and highly efficient, techniques to enforce strong safety properties for *unmodified* C programs. We have ported the Linux kernel to SVA with only minimal changes to the machine-independent part of the kernel. The safety guarantees in SVA are close to, but slightly weaker than, those provided by a safe language like Java, C\#, or Modula-3; these compromises are key to both efficiency and minimal porting changes. The approach is robust because both SVA and the virtual machine are designed to remove the complex, safety-checking compiler from the trusted computing base, and requiring only a simple type checker to be trusted. The SVA design also enables similarly robust implementation of higher-level security properties that can be represented as type systems. The safe execution environment enforced by SVA can provide three benefits for operating system designers and users. First, it can eliminate a large class of vulnerabilities that are by far the most common targets of exploits today. Second, a safe execution environment can foster new avenues for innovation in commodity systems, by incorporating techniques developed in research kernels using safe languages, such as extensibility, type-safe communication, and others. Third, many higher-level security problems could be addressed effectively by a combination of compiler and run-time techniques enabled by a compiler-based virtual machine. The long-term goal of the SVA project is to develop new solutions to higher-level security problems in current systems.




Other Videos By Microsoft Research


2016-09-06High Fidelity Image-Based Modeling
2016-09-06The Meaning of the 21st Century: A Blueprint for Ensuring Our Future           
2016-09-06Social Balance on Networks: The Dynamics of Friendship and Hatred [1/30]
2016-09-06Provably Optimal Solutions to Geometric Vision Problems
2016-09-06Interaction Design Projects for Health and Wellness
2016-09-06Congestion Games: Optimization in Competition
2016-09-06Bayesian topic models
2016-09-06A Passion for Calendars -- From the Maya to Mars
2016-09-06Persuasive Games: The Expressive Power of Videogames           
2016-09-06In-Network, Physical Adaptation of Sensor Networks
2016-09-06Secure Virtual Architecture: A Novel Foundation for Operating System Security
2016-09-06Engineering Performance Using Control Theory: A One Day How-To: Theory Part 2
2016-09-06Effective Scientific Data Management through Provenance Collection
2016-09-06Unified Dimensionality Reduction: Formulation, Solution and Beyond
2016-09-06Engineering Performance Using Control Theory: A How-To: Control Analysis & Real world applications
2016-09-06A Real-World Test-bed for Mobile Adhoc Networks: Methodology, Experimentations, Simulation & Results
2016-09-06Fusion of Optical and Radio Frequency Techniques: Cameras, Projectors and Wireless Tags
2016-09-06Hierarchical Phrase-Based Translation with Suffix Arrays.
2016-09-06Multi-stack automata reachability: A New Tractable Subclass
2016-09-06Seduced by Success: How the Best Companies Survive the 9 Traps of Winning          
2016-09-06Everything is Miscellaneous: The Power of the New Digital Disorder



Tags:
microsoft research