A novel approach for untrusted code execution

  • Authors:
  • Yan Wen;Jinjing Zhao;Huaimin Wang

  • Affiliations:
  • School of Computer, National University of Defense Technology, Changsha, China;Beijing Institute of System Engineering, Beijing, China;School of Computer, National University of Defense Technology, Changsha, China

  • Venue:
  • ICICS'07 Proceedings of the 9th international conference on Information and communications security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present a new approach called Secure Virtual Execution Environment (SVEE) which enables users to "try out" untrusted software without the fear of damaging the system in any manner. A key feature of SVEE is that it implements the OS isolation by executing untrusted code in a hosted virtual machine. Another key feature is that SVEE faithfully reproduces the behavior of applications, as if they were running natively on the underlying host OS. SVEE also provides a convenient way to compare the changes within SVEE and host OS. Referring to these comparison results, users can make a decision to commit these changes or not. With these powerful characteristics, SVEE supports a wide range of tasks, including the study of malicious code, controlled execution of untrusted software and so on. This paper focuses on the execution model of SVEE and the security evaluation for this model.