Why Confinements (Separated Components)
- Isolation components to ensure security.
- If the machine is compromised, the privileged will be set up
against
you.- Limit each application to
a small subset
of the system'sresources
.Resources to protect
- CPU time
- Real and Virtual memory
- Disk space
- Network Identity
- Network Access rights...
Covert channels:
Storage channels:
Timing channels:
Password-checking channel:
Limit covert channels: