Capítulo de livro Revisado por pares

A Secure Architecture for Operating System-Level Virtualization on Mobile Devices

2016; Springer Science+Business Media; Linguagem: Inglês

10.1007/978-3-319-38898-4_25

ISSN

1611-3349

Autores

Manuel Huber, Julian Horsch, Michael Velten, Michael Weiß, Sascha Wessel,

Tópico(s)

Physical Unclonable Functions (PUFs) and Hardware Security

Resumo

In this paper, we present a novel secure architecture for OS-level virtualization on mobile devices. OS-level virtualization allows to simultaneously operate multiple userland OS instances on one physical device. Compared to previous approaches, our main objective is the confidentiality of sensitive user data stored on the device. We isolate the OS instances by restricting them to a set of minimal, controlled functionality and allow communication between components exclusively through well-defined channels. With our secure architecture, we therefore go beyond the common deployment of Linux kernel mechanisms, such as namespaces or cgroups. We develop a specially tailored, stacked LSM concept using SELinux and a custom LSM, leverage Linux capabilities and the cgroups devices subsystem. Based on the architecture, we present secure device virtualization concepts allowing to dynamically assign device functionalities to different OS instances. Furthermore, we develop a mechanism for secure switching between the instances. We realize the architecture with a fully functional and performant implementation on the Samsung Galaxy S4 and Nexus 5 mobile devices, running Android 4.4.4 and 5.1.1, respectively. With a systematic security evaluation, we demonstrate that the secure isolation of OS instances provides confidentiality even when large parts of the system are compromised.

Referência(s)