Abstract | ||
---|---|---|
Processes need a variety of resources from their operating environment in order to run properly, but adversary may control the inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabilities. Conventional access control methods are not suitable to prevent such vulnerabilities because they use one set of permissions for all system call invocations. In this paper, we define a novel policy model for describing when resource retrievals are unsafe, so they can be blocked. This model highlights two contributions: (1) the explicit definition of adversary models as adversarial roles, which list the permissions that dictate whether one subject is an adversary of another, and (2) the application of data-flow to determine the adversary control of the names used to retrieve resources. An evaluation using multiple adversary models shows that data-flow is necessary to authorize resource retrieval in over 90% of system calls. By making adversary models and the adversary accessibility of all aspects of resource retrieval explicit, we can block resource access attacks system-wide. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1145/2613087.2613111 | SACMAT |
Keywords | Field | DocType |
access controls,protection,resource access attacks | Operating environment,Computer science,Adversary model,Computer security,System call,Access control,Adversary,Vulnerability,Adversarial system | Conference |
Citations | PageRank | References |
0 | 0.34 | 45 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hayawardh Vijayakumar | 1 | 134 | 8.37 |
Xinyang Ge | 2 | 95 | 6.54 |
T Jaeger | 3 | 2635 | 255.67 |