A Self-healing Component Sandbox for Untrustworthy Third Party Code Execution

Kiev Gama 1 Didier Donsez 1
1 LIG Laboratoire d'Informatique de Grenoble - ADELE
LIG - Laboratoire d'Informatique de Grenoble
Abstract : This paper presents an architecture and implementation of a self-healing sandbox for the execution of third party code dynamically loaded which may potentially put in risk application stability. By executing code in a fault contained sandbox, no faults are propagated to the trusted part of the application. The sandbox is monitored by a control loop that is able to predict and avoid known types of faults. If the sandbox crashes or hangs, it can be automatically recovered to normal activity without needing to stop the main application. A comparison between an implementation of the sandbox in a domain-based isolation and operating-system based isolation analyses performance overhead, memory footprint and sandbox reboot time in both approaches. The implementation has been tested in a simulation of an RFID and sensor-based application.
Type de document :
Communication dans un congrès
13th International Symposium, CBSE 2010, Jun 2010, Prague, Czech Republic. pp.130-149, 2010, 〈10.1007/978-3-642-13238-4_8〉
Liste complète des métadonnées

https://hal.archives-ouvertes.fr/hal-00941858
Contributeur : Vincent Lestideau <>
Soumis le : mardi 4 février 2014 - 13:25:48
Dernière modification le : jeudi 11 octobre 2018 - 08:48:03

Identifiants

Collections

Citation

Kiev Gama, Didier Donsez. A Self-healing Component Sandbox for Untrustworthy Third Party Code Execution. 13th International Symposium, CBSE 2010, Jun 2010, Prague, Czech Republic. pp.130-149, 2010, 〈10.1007/978-3-642-13238-4_8〉. 〈hal-00941858〉

Partager

Métriques

Consultations de la notice

99