2015
DOI: 10.1007/978-3-319-15618-7_14
|View full text |Cite
|
Sign up to set email alerts
|

Producing Hook Placements to Enforce Expected Access Control Policies

Abstract: Abstract. Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control access to resources, authorization hooks are placed before operations on those resources. Manual hook placements by programmers are often incomplete or incorrect, leading to insecure programs. We advocate an approach that automatically identifies the set of locations to place authorization hooks that mediates all security-sensitive operations in order to enforce expected access control policies at … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Compared with the results in [24], LSM hooking is still efficient and does not cause tangible performance impact. However, SELinux hooking could cause large performance drop for open (87%) and stat (30%), overhead for open is small in absolute value (about 1 šœ‡šœ‡s), however the absolute value might be higher for low-end embedded systems [26]; the overhead for mkdir and rmdir is smaller than 2%; for the rest of the tests, the overhead ranges from 8% to 19%. We also report the performance overhead (regression rate) of SELinux hooking using Equation (2), see Figure 3.…”
Section: Evaluation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with the results in [24], LSM hooking is still efficient and does not cause tangible performance impact. However, SELinux hooking could cause large performance drop for open (87%) and stat (30%), overhead for open is small in absolute value (about 1 šœ‡šœ‡s), however the absolute value might be higher for low-end embedded systems [26]; the overhead for mkdir and rmdir is smaller than 2%; for the rest of the tests, the overhead ranges from 8% to 19%. We also report the performance overhead (regression rate) of SELinux hooking using Equation (2), see Figure 3.…”
Section: Evaluation Resultsmentioning
confidence: 99%
“…Previous hook placement works [7,10,16,25,26] try to minimize the count of hooks, not performance (i.e. hook invocations).…”
Section: Analysis Of Resultsmentioning
confidence: 99%
“…(2) it must be tamperproof; and (3) its operation must be verified to be correct via complete testing. Researchers have explored a variety of techniques to assess the correctness of authorization, particularly complete mediation, by assessing control flow [13], [20], [9], [8], [17], [18], [14], [15], [16] (i.e., all control flows to security-sensitive operations are mediated) and data flow [36], [37], [24], [25] (i.e., all accesses to data obey an information flow policy). However, those techniques do not detect tampering.…”
Section: B the Tamper Problem For Reference Monitorsmentioning
confidence: 99%
“…In the past, researchers developed several automated analyses to detect failures in complete mediation [13], [14], [15], [16], [17], [18], [19], [8], [9], [20]. Such analyses detect the absence of authorization checks [13], [20], [9], detect inconsistent use of authorization checks [8], [16], and propose placements and/or repairs for missing checks [14], [15], [17], [18], [19]. These methods use control flows to determine what authorization checks are expected at particular points in the program.…”
Section: Introductionmentioning
confidence: 99%
“…JIGSAW [16] is an automated tool to protect programs from resource access attacks. There are also studies [17][18][19] that perform access control analysis to protect security-sensitive operations from access by unauthorized subjects.…”
Section: Access Control Analysismentioning
confidence: 99%