Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation
Fangfei Yang, Bumjin Im, Weijie Huang, Kelly Kaoudis, Anjo Vahldiek-Oberwagner, Chia-Che Tsai, Nathan Dautenhahn
33rd USENIX Security Symposium · Day 1 · USENIX Security '24
The talk "Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation" by Fangfei Yang and collaborators from Rice University and other institutions, introduces **Endokernel**, a novel approach to achieving robust intra-process isolation in multi-threaded environments. Modern applications, even those designed with internal security boundaries, remain vulnerable to exploitation due to the inherent complexities of managing shared resources and kernel interactions within a single process space. A seemingly isolated module, if compromised, can leverage system calls and multi-threading race conditions to bypass monitor checks and access sensitive data in other modules.
AI review
Endokernel delivers a critical deep dive into the often-overlooked kernel interface gaps that undermine intra-process isolation in multi-threaded environments. This research exposes severe race conditions, `sigreturn` exploits, and direct physical memory bypasses, offering a pragmatic and effective solution to a pervasive problem. It's essential viewing for anyone serious about building truly secure, compartmentalized applications.