Isolation Mechanisms for Commodity Applications and Platforms

Web clients have evolved into user−level operating systems. They run applications from friendly and hostile providers side by side, often within a single process address space. This presents a poor match for legacy operating systems that assign application privileges based on local user identities, and that implement isolation domains with process granularity. This report reviews a number of techniques for contemporary systems that can partition an application into trusted and untrusted parts. These techniques can enforce different policies for different applications that run on behalf of the same user, even when the applications become corrupted.

By: Wietse Venema

Published in: RC24725 in 2009

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rc24725.pdf

Questions about this service can be mailed to reports@us.ibm.com .