skip to main content
10.1145/1655148.1655155acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Application containers without virtual machines

Published:09 November 2009Publication History

ABSTRACT

This position paper introduces lightweight cryptographic jails (CryptoJails) that protect the privacy of application data by intercepting write accesses and redirecting them to encrypted application containers. CryptoJails ensure that application data (for example, cached emails or web pages) cannot be read or undetectably altered by other applications. Unlike existing approaches, CryptoJails do not require kernel modifications or even superuser (i.e., root) privileges, do not impose significant performance overhead, and may even be used with already installed applications.

References

  1. M. Blaze. A Cryptographic File System for UNIX. In 1st ACM Conference on Computer and Communications Security (CCS), pages 9--16, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K. Borders, E. V. Weele, B. Lau, and A. Prakash. Protecting Confidential Data on Personal Computers with Storage Capsules. In 18th USENIX Security Symposium, August 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A Secure Environment for Untrusted Helper Applications. In Sixth USENIX Security Symposium, July 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T. Jaeger, R. Sailer, and X. Zhang. Analyzing integrity protection in the SELinux example policy. In SSYM'03: Proceedings of the 12th Conference on USENIX Security Symposium, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Z. Liang, V. N. Venkatakrishnan, and R. Sekar. Isolated program execution: An application transparent approach for executing untrusted programs. In ACSAC '03: Proceedings of the 19th Annual Computer Security Applications Conference, page 182, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. National Security Agency (NSA). Security-Enhanced Linux (SELinux). http://www.nsa.gov/research/selinux.Google ScholarGoogle Scholar
  7. TrueCrypt Foundation. TrueCrypt: Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux. http://www.truecrypt.org/.Google ScholarGoogle Scholar
  8. C. Weinhold and H. Hartig. VPFS: building a virtual private file system with a small trusted computing base. In Eurosys '08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, pages 81--93, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Application containers without virtual machines

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          VMSec '09: Proceedings of the 1st ACM workshop on Virtual machine security
          November 2009
          58 pages
          ISBN:9781605587806
          DOI:10.1145/1655148

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 November 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader