In systems owned by normal end-users, many times security attacks are mounted by sneaking in malicious applications or exploiting existing software vulnerabilities through security non-conforming actions of users. Virtualization approaches can address this problem by providing a quarantine environment for applications, malicious devices, and device drivers, which are mostly used as entry points for security attacks. However, the existing methods to provide quarantine environments using virtualization are not transparent to the user, both in terms of application interface transparency and file system transparency. Further, software configuration level solutions like remote desktops and remote application access mechanisms combined with shared file systems do not meet the user transparency and security requirements. We propose qOS, a VM-based solution combined with certain OS extensions to meet the security requirements of end-point systems owned by normal users, in a transparent and efficient manner. We demonstrate the efficacy of qOS by empirically evaluating the prototype implementation in the Linux+KVM system in terms of efficiency, security, and user transparency.
翻译:在正常最终用户拥有的系统中,安全攻击往往通过恶意应用手段,或通过用户采取不符合安全要求的行动,利用现有软件弱点来进行。虚拟化办法可以解决这个问题,为应用程序、恶意装置和装置驱动器提供检疫环境,这些应用器、恶意装置和装置驱动器大多被用作安全攻击的切入点。但是,在应用接口透明度和档案系统透明度方面,现有利用虚拟化提供检疫环境的方法对用户不透明。此外,远程桌面和远程应用程序访问机制等软件配置层面的解决办法,加上共享的文档系统,不符合用户透明度和安全要求。我们提议采用基于虚拟系统的解决办法,加上某些软件扩展,以透明和高效的方式满足正常用户拥有的终端系统的安全要求。我们通过对Linux+KVM系统原型实施效率、安全和用户透明度进行经验性评估,展示了QOS的效力。