Proceedings 2018 Network and Distributed System Security Symposium 2018
DOI: 10.14722/ndss.2018.23131
|View full text |Cite
|
Sign up to set email alerts
|

BreakApp: Automated, Flexible Application Compartmentalization

Abstract: Developers of large-scale software systems may use third-party modules to reduce costs and accelerate release cycles, at some risk to safety and security. BREAKAPP exploits module boundaries to automate compartmentalization of systems and enforce security policies, enhancing reliability and security. BREAKAPP transparently spawns modules in protected compartments while preserving their original behavior. Optional high-level policies decouple security assumptions made during development from requirements impose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(32 citation statements)
references
References 28 publications
0
32
0
Order By: Relevance
“…Security-oriented compartmentalization [8,11,44] decomposes software into multiple isolated components with the goal of improving its security properties-and often at the boundaries of (third-party) modules [47,59,84,86]. However, it does not leverage runtime profiling, and is usually static, targeting privilege reduction rather than performance increase.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Security-oriented compartmentalization [8,11,44] decomposes software into multiple isolated components with the goal of improving its security properties-and often at the boundaries of (third-party) modules [47,59,84,86]. However, it does not leverage runtime profiling, and is usually static, targeting privilege reduction rather than performance increase.…”
Section: Related Workmentioning
confidence: 99%
“…Light-touch distribution occupies a known middle-ground [10,54,86] between flexibility and automation ( §9), and is enabled today by a confluence of trends in software developmentnamely, the increasingly pervasive use of (i) dynamic, interpreted languages, (ii) fine-grained modules with clear boundaries, and (iii) cooperatively concurrent, continuationpassing programming styles (CPS). Examples of such environments include JavaScript, Julia, and Lua; our Ignis prototype targets server-side JavaScript ( §7).…”
Section: Introductionmentioning
confidence: 99%
“…Further transformations (not detailed) aim to detect module accesses to their surrounding environment-including accesses to global variables, top-level objects, etc.-and capture a module's full observable behavior. One way to achieve this is by shadowing and transforming free variables in the module environment during the module-loading process [79,81].…”
Section: Breaking Down Into Modulesmentioning
confidence: 99%
“…To infer large-scale applications, we propose to exploit the modularity of modern software to enable effective (and scalable) inference. This direction leverages the trend of increasingly popular third-party library usage [6,16,52,79,81,89]. Applications with less modular designs will likely present a cost-of-inference challenge and the need for refining the observation and inference models used.…”
Section: Challenges and Threats To Validitymentioning
confidence: 99%
“…We need not be very precise, here, about the details of the source language; we just assume that it is equipped with some compartmentalization facility [33,78] that allows programmers to break up security-critical applications into mutually distrustful components that have clearly specified privileges and can only interact via well-defined interfaces. In fact we assume that the interface of each component gives a precise description of its privilege.…”
Section: Rscc By Examplementioning
confidence: 99%