Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Sealing OS Processes to Improve Dependability and Safety
 
conference paper

Sealing OS Processes to Improve Dependability and Safety

Hunt, Galen
•
Aiken, Mark
•
Fähndrich, Manuel
Show more
2007
2nd ACM SIGOPS/EuroSys European Conference on Computer Systems

In most modern operating systems, a process is a hardware-protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms---dynamic code loading, run-time code generation, shared memory, and intrusive system APIs---make the barrier between processes very permeable. This paper argues that this traditional open process architecture exacerbates the dependability and security weaknesses of modern systems. As a remedy, this paper proposes a sealed process architecture, which prohibits dynamic code loading, self-modifying code, shared memory, and limits the scope of the process API. This paper describes the implementation of the sealed process architecture in the Singularity operating system, discusses its merits and drawbacks, and evaluates its effectiveness. Some benefits of this sealed process architecture are: improved program analysis by tools, stronger security and safety guarantees, elimination of redundant overlaps between the OS and language runtimes, and improved software engineering. Conventional wisdom says open processes are required for performance; our experience suggests otherwise. We present the first macrobenchmarks for a sealed-process operating system and applications. The benchmarks show that an experimental sealed-process system can achieve performance competitive with highly-tuned, commercial, open-process systems.

  • Details
  • Metrics
Type
conference paper
DOI
10.1145/1272996.1273032
Author(s)
Hunt, Galen
•
Aiken, Mark
•
Fähndrich, Manuel
•
Hawblitzel, Chris
•
Hodson, Orion
•
Larus, James
•
Levi, Steven
•
Steensgaard, Bjarne
•
Tarditi, David
•
Wobber, Ted
Date Issued

2007

Publisher

ACM

Published in
2nd ACM SIGOPS/EuroSys European Conference on Computer Systems
Start page

341

End page

354

Note

1273032

Editorial or Peer reviewed

REVIEWED

Written at

OTHER

EPFL units
VLSC  
Available on Infoscience
December 23, 2013
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/98680
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés