Title
Policy models to protect resource retrieval
Abstract
Processes need a variety of resources from their operating environment in order to run properly, but adversary may control the inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabilities. Conventional access control methods are not suitable to prevent such vulnerabilities because they use one set of permissions for all system call invocations. In this paper, we define a novel policy model for describing when resource retrievals are unsafe, so they can be blocked. This model highlights two contributions: (1) the explicit definition of adversary models as adversarial roles, which list the permissions that dictate whether one subject is an adversary of another, and (2) the application of data-flow to determine the adversary control of the names used to retrieve resources. An evaluation using multiple adversary models shows that data-flow is necessary to authorize resource retrieval in over 90% of system calls. By making adversary models and the adversary accessibility of all aspects of resource retrieval explicit, we can block resource access attacks system-wide.
Year
DOI
Venue
2014
10.1145/2613087.2613111
SACMAT
Keywords
Field
DocType
access controls,protection,resource access attacks
Operating environment,Computer science,Adversary model,Computer security,System call,Access control,Adversary,Vulnerability,Adversarial system
Conference
Citations 
PageRank 
References 
0
0.34
45
Authors
3
Name
Order
Citations
PageRank
Hayawardh Vijayakumar11348.37
Xinyang Ge2956.54
T Jaeger32635255.67