120 likes | 316 Views
User-Centric Computing. JD Douceur Jon Howell Jay Lorch James Mickens. Bryan Parno. Microsoft Research. Goal : Free users from all administrative tasks. Examples :. Problems :. Install a program. Install malware. Install a driver. Install a rootkit. Configure the firewall.
E N D
User-Centric Computing JD Douceur Jon Howell Jay Lorch James Mickens Bryan Parno Microsoft Research
Goal: Freeusers from all administrative tasks Examples: Problems: Install a program Install malware Install a driver Install a rootkit Configure the firewall Create a hole in the firewall Approach: Removeuser’s abilityto perform admin tasks
Is This Acceptable? User-Centric Computing
Ability/Control Mismatch Welcome to BubbleSoft! • Full system control • Limited expertise BubbleUp Now with more bubbles! • High expertise in BubbleUp • No system control
Correct Alignment: User: • Can make high-level decisions • Do I like BubbleSoft? • Do I want to share this picture with my coworkers? Vendor: • Can reliably present an experience to the user • Cannot be affected by other vendors’ decisions
Foundations of User-Centric Computing • Strong Isolation + Minimal TCB • Disaggregation • “Protocol”-Based Communication
1) Strong Isolation + Minimal TCB App App … Vendor Vendor OS Drivers Modules Kernel Kernel Kernel
2) Disaggregation Vendor Vendor Windowing Physics Lib 3D Graphics Network File System NTFS File System Ext4 Blob Store IPC
3) “Protocol”-Based Communication • Allcommunicationhappens via network protocols Key Point: No special privileges from being co-located! Vendor Vendor Kernel
User-Driven Sharing • Leverage existing delegation metaphors • When querying user, questions should be: • Rare • Narrow in scope • User-meaningful
Conclusions • Removing a user’s admin powers can improve security and usability • Disaggregate and formalize communication to avoid TCB bloat • Many questions remain, esp. regarding user-driven sharing Thank you! parno@microsoft.com