Главная
Study mode:
on
1
Intro
2
Container advantages
3
Motivation
4
BlackBox
5
Container Security Monitor (CSM)
6
Protected Physical Address Space (PPAS)
7
Container Security Monitor - PPASes
8
Container Security Monitor ABI - Example
9
Managing PPAS Memory - Page Fault
10
OS Interactions - IPC
11
Memory Mapping lago Attacks
12
Implementing PPASes
13
Implementation - Interposing
14
Implementation - Task Identification
15
Application Performance
Description:
Explore a conference talk on BlackBox, a novel container architecture designed to enhance security for containerized applications without relying on the operating system. Learn about the Container Security Monitor, a small trusted computing base that creates Protected Physical Address Spaces (PPASes) for each container, preventing direct information flow between containers and the operating system. Discover how BlackBox leverages Arm hardware virtualization support to implement PPASes, supports Linux containers with minimal kernel modifications, and offers superior security guarantees compared to traditional hypervisor and container architectures. Examine the implementation details, including interposing, task identification, and application performance, while understanding how BlackBox addresses the security risks posed by large operating system codebases containing vulnerabilities.

BlackBox - A Container Security Monitor for Protecting Containers on Untrusted Operating Systems

USENIX
Add to list
0:00 / 0:00