Visible to the public A Study of Security Isolation Techniques

TitleA Study of Security Isolation Techniques
Publication TypeJournal Article
Year of Publication2016
AuthorsShu, Rui, Wang, Peipei, Gorski III, Sigmund A, Andow, Benjamin, Nadkarni, Adwait, Deshotels, Luke, Gionta, Jason, Enck, William, Gu, Xiaohui
JournalACM Comput. Surv.
Volume49
Pagination50:1–50:37
ISSN0360-0300
KeywordsAccess Control, pubcrawl, resilience, Resiliency, Resilient Architectures, Security isolation
Abstract

Security isolation is a foundation of computing systems that enables resilience to different forms of attacks. This article seeks to understand existing security isolation techniques by systematically classifying different approaches and analyzing their properties. We provide a hierarchical classification structure for grouping different security isolation techniques. At the top level, we consider two principal aspects: mechanism and policy. Each aspect is broken down into salient dimensions that describe key properties. We break the mechanism into two dimensions, enforcement location and isolation granularity, and break the policy aspect down into three dimensions: policy generation, policy configurability, and policy lifetime. We apply our classification to a set of representative articles that cover a breadth of security isolation techniques and discuss tradeoffs among different design choices and limitations of existing approaches.

URLhttp://doi.acm.org/10.1145/2988545
DOI10.1145/2988545
Citation Keyshu_study_2016