Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Enabling Secure Internet Access with ISA Server
COURSE: COMPUTER PLATFORMS
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Secure web browsers, malicious hardware, and hardware support for binary translation Sam King.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Chapter 21 Successfully Implementing The Information System
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Mi-Joung choi, Hong-Taek Ju, Hyun-Jun Cha, Sook-Hyang Kim and J
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Firefox 2 Feature Proposal: Remote User Profiles TeamOne August 3, 2007 TeamOne August 3, 2007.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
The Origin of the VM/370 Time-sharing system Presented by Niranjan Soundararajan.
VMware vCenter Server Module 4.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Intranet, Extranet, Firewall. Intranet and Extranet.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .

Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
VirtualBox What you need to know to build a Virtual Machine.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
The Entropia Virtual Machine for Desktop Grids Brad Calder, Andrew A. Chien, Ju Wang, Don Yang – VEE-2005 Raju Kumar CS598C: Virtual Machines.
Chapter 2 Operating System Overview
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
M. Alexander Helen J. Wang Yunxin Liu Microsoft Research 1 Presented by Zhaoliang Duan.
1 WWW. 2 World Wide Web Major application protocol used on the Internet Simple interface Two concepts –Point –Click.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Security Vulnerabilities in A Virtual Environment
Wireless and Mobile Security
1 Isolating Web Programs in Modern Browser Architectures CS6204: Cloud Environment Spring 2011.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
OPERATING SYSTEMS DO YOU REQUIRE AN OPERATING SYSTEM IN YOUR SYSTEM?
Y >_< I Y 一,一一,一 I A Safety-Oriented Platform for Web Applications Richard S.Cox Jacob Gorm Hansen Steven D.Gribble Henry M. Levy IEEE S&P 2006 Zong-Cing.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Distributed OS.
A Quick Tour of Ceedo Safe Browsing and Remote Access Protection.
Chapter 6: Securing the Cloud
Web Development Web Servers.
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
FTP - File Transfer Protocol
Oracle Solaris Zones Study Purpose Only
System And Application Software
Information Technology Ms. Abeer Helwa
Lecture 3: Secure Network Architecture
Web Servers (IIS and Apache)
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Copyright © cs-tutorial.com

Overview Introduction Architecture Implementation Evaluation

Introduction Nascent Web Hypertext document system Fetched and presented simple static content Modern Web Provides access to an enormous number of service and resources Download and execute programs A de facto operating system for executing client-side components of Web Applications

Introduction Current browsers are vulnerable Drive-by downloads can cause spyware infections Trusted plug-ins may have security holes Browsers fails to provide isolation

Introduction A new browsing system architecture : Tahoma Three key principles Web Application should not be trusted Web browsers should not be trusted Users should be able to identify and manage downloaded Web application Web applications are isolated in their own private virtual machine A prototype of the Tahoma browsing system using Linux and the Xen virtual machine monitor is implemented

Architecture Tahoma’s six key features Defines a new trusted system layer, the browser operating system (BOS) Provides explicit support for Web application Browser instance Web service Enforces isolation between Web applications Enforces policies defined by the Web service Manifest Supports an enhanced window interface Provides resource support

Architecture

Web Applications The execution environment as viewed by browser instance

Architecture Web Applications (continued) Users accessing a Web application for the first time must approve its installation Advantages of the VM environment Web application is safe from interference by other application Local effects can be easily removed Increases flexibility for the programming of Web applications

Architecture Web applications (continued) Manifest Used by Web service to specify the characteristics of its application Can be retrieved by BOS when it first accesses the service Presents a digital signature Specifies the code that will run in the browser instance Specifies Internet access policies Web sites or URLs that are allowed to access Protect the Web application from compromised browsers

Architecture The Browser Operating System (BOS) Trusted computing base for the Tahoma browsing system Instantiates and manages the collection of browser instances Multiplex the virtual screens Store long-term state associated with browser instance Enforce the network policies

Architecture

 The Browser Operating System (continued)  Provides users with control panel and bookmark management tools  Mediates all network interactions between a browser instance and remote Web sites  Different choices of implementation Running in its own virtual machine with browser instances running in separate virtual machine Implemented as a virtual machine monitor running directly on the physical hardware, with browser instances running in VMs above it

Implementation

Three main BOS processes BOS kernel: manages browser instances and the durable storage of the system Network proxy: a reverse firewall Windows Manager: aggregates browser instance windows into the physical screen

Implementation Communications between BOS and Browser instances Interface: libraries linked into the browser BOS system functions (libBOS) Graphics functions (libQT) Using browser-calls and upcalls Implemented as XML-formatted remote procedure calls Carried over a TCP connection on a point-to-point virtual network

Implementation Inter-browser communication paths fork browser-calls Include the target URL BinStore and BinFetch browser-calls BOS implements private holding bin for each browser instance Transfer between the holding bin and the host OS must be initiated by a user through a trusted Tahoma tool

Implementation Xen and the Browser Instance Each Xen VM executing a browser instance A read-only root disk contains the base file system for the browser instance A writable data disk provides storage for any data the browser instance needs to durably store Persistent changes made by the application are applied the virtual data disk on the guest OS

Implementation Manifest Includes A network policy A browser policy A digital signature A human-readable Web Application name A machine-readable manifest name A globally unique identifier for the application

Implementation Manifest (continued) Location HTTP header extension in a web object indicate the manifest name and where it can be download Per-server manifest files Local database of manually supplied manifest files Authentication Web servers sign manifests using the private key Tahoma uses public-key certificates to authenticate Web applications to clients Rely on traditional PKI certification authorities

Implementation The Windows Manager Implements the user interface Runs in domain 0 Provides a virtual screen abstraction to each browser instance Within the virtual screen, browser can create and position one or more rectangular sprites Each sprite consists of a grid of tiles Each tile is backed by a 4KB page in virtual memory Can be implemented in several different ways

Implementation

Browser Needs to be modified to run on Tahoma Linking to libQT to access the Tahoma graphics sub-system Using a browser-call to access remote services, rather than accessing the network directly through a virtual device Using browser-calls for new functions, such as forking a new browser instance and interacting with the holding bin

Evaluation

Conclusions Each Web application is isolated within its own virtual machine sandbox, removing the need to trust Web browsers and Web services A new trusted software layer (BOS) is introduced to manages Web applications and their virtual machine sandbox Network policies and browser policies are enforced

Thank You