1 / 11

User-Centric Computing

User-Centric Computing. JD Douceur Jon Howell Jay Lorch James Mickens. Bryan Parno. Microsoft Research. Goal : Free users from all administrative tasks. Examples :. Problems :. Install a program. Install malware. Install a driver. Install a rootkit. Configure the firewall.

deion
Télécharger la présentation

User-Centric Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. User-Centric Computing JD Douceur Jon Howell Jay Lorch James Mickens Bryan Parno Microsoft Research

  2. Goal: Freeusers from all administrative tasks Examples: Problems: Install a program Install malware Install a driver Install a rootkit Configure the firewall Create a hole in the firewall Approach: Removeuser’s abilityto perform admin tasks

  3. Is This Acceptable? User-Centric Computing

  4. Ability/Control Mismatch Welcome to BubbleSoft! • Full system control • Limited expertise BubbleUp Now with more bubbles! • High expertise in BubbleUp • No system control

  5. Correct Alignment: User: • Can make high-level decisions • Do I like BubbleSoft? • Do I want to share this picture with my coworkers? Vendor: • Can reliably present an experience to the user • Cannot be affected by other vendors’ decisions

  6. Foundations of User-Centric Computing • Strong Isolation + Minimal TCB • Disaggregation • “Protocol”-Based Communication

  7. 1) Strong Isolation + Minimal TCB App App … Vendor Vendor OS Drivers Modules Kernel Kernel Kernel

  8. 2) Disaggregation Vendor Vendor Windowing Physics Lib 3D Graphics Network File System NTFS File System Ext4 Blob Store IPC

  9. 3) “Protocol”-Based Communication • Allcommunicationhappens via network protocols Key Point: No special privileges from being co-located! Vendor Vendor Kernel

  10. User-Driven Sharing • Leverage existing delegation metaphors • When querying user, questions should be: • Rare • Narrow in scope • User-meaningful

  11. Conclusions • Removing a user’s admin powers can improve security and usability • Disaggregate and formalize communication to avoid TCB bloat • Many questions remain, esp. regarding user-driven sharing Thank you! parno@microsoft.com

More Related