Eliminating Trust From Application Programs By Way Of Software Architecture
dc.contributor.author | Franz, Michael | |
dc.contributor.editor | Herrmann, Korbinian | |
dc.contributor.editor | Brügge, Bernd | |
dc.date.accessioned | 2019-05-06T09:37:03Z | |
dc.date.available | 2019-05-06T09:37:03Z | |
dc.date.issued | 2008 | |
dc.description.abstract | In many of today’s application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnecessarily large and audit costs are high. We present a software architecture in which applications can be completely untrusted, even when they manipulate secrets. Key to our approach is the use of a trusted multi-level security virtual machine, inside of which all secrets remain locked at all times. In an experimental prototype, we were able to bring down the run-time overhead much lower than expected, by using aggressive dynamic compilation and static analysis techniques. | en |
dc.identifier.isbn | 978-3-88579-215-4 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/22221 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e. V. | |
dc.relation.ispartof | Software Engineering 2008 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-121 | |
dc.title | Eliminating Trust From Application Programs By Way Of Software Architecture | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 126 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 112 | |
gi.conference.date | 18.-22.02.2008 | |
gi.conference.location | München | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1