Salus: Kernel Support for Secure Process Compartments

Authors

DOI:

https://doi.org/10.4108/sesa.2.3.e1

Keywords:

Privilege separation, principle of least privilege, modularization

Abstract

Consumer devices are increasingly being used to perform security and privacy critical tasks. The software used to perform these tasks is often vulnerable to attacks, due to bugs in the application itself or in included software libraries. Recent work proposes the isolation of security-sensitive parts of applications into protected modules, each of which can be accessed only through a predefined public interface. But most parts of an application can be considered security-sensitive at some level, and an attacker who is able to gain inapplication level access may be able to abuse services from protected modules.

We propose Salus, a Linux kernel modification that provides a novel approach for partitioning processes into isolated compartments sharing the same address space. Salus significantly reduces the impact of insecure interfaces and vulnerable compartments by enabling compartments (1) to restrict the system calls they are allowed to perform, (2) to authenticate their callers and callees and (3) to enforce that they can only be accessed via unforgeable references. We describe the design of Salus, report on a prototype implementation and evaluate it in terms of security and performance. We show that Salus provides a significant security improvement with a low performance overhead, without relying on any non-standard hardware support.

Downloads

Published

30-01-2015

How to Cite

Strackx, R. ., Agten, P. ., Avonds, N. ., & Piessens, F. . (2015). Salus: Kernel Support for Secure Process Compartments. EAI Endorsed Transactions on Security and Safety, 2(3), e1. https://doi.org/10.4108/sesa.2.3.e1