Shielding Applications from an Untrusted Cloud with Haven, OSDI 2014
Discussion lead: Niel Lebeck and Yuchen Jin
What is an Iago attack? Does the shield module as described in the paper protect against all Iago attacks?
Compare the interface presented by the shield module to the interface presented by an exokernel. How are they similar/different?
What are the drawbacks of Haven? Do you agree with the paper’s assertion that many users would find these drawbacks acceptable?
Provide a list of questions you would like to discuss in class. Feel free to provide any comments on the paper and related topics (e.g., which parts you like and which parts you find confusing).