Clean Application Compartmentalization with SOAAP

被引:38
作者
Gudka, Khilan [1 ]
Watson, Robert N. M. [1 ]
Anderson, Jonathan [2 ]
Chisnall, David [1 ]
Davis, Brooks [3 ]
Laurie, Ben [4 ]
Marinos, Ilias [1 ]
Neumann, Peter G. [3 ]
Richardson, Alex [1 ]
机构
[1] Univ Cambridge, Cambridge, England
[2] Mem Univ, St John, NF, Canada
[3] SRI Int, Menlo Pk, CA 94025 USA
[4] Google UK Ltd, London, England
来源
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2015年
基金
英国工程与自然科学研究理事会; 加拿大自然科学与工程研究理事会;
关键词
Security; Compartmentalization; Vulnerability Mitigation;
D O I
10.1145/2810103.2813611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Application compartmentalization, a vulnerability mitigation technique employed in programs such as OpenSSH and the Chromium web browser, decomposes software into isolated components to limit privileges leaked or otherwise available to attackers. However, compartmentalizing applications and maintaining that compartmentalization is hindered by ad hoc methodologies and significantly increased programming effort. In practice, programmers stumble through (rather than overtly reason about) compartmentalization spaces of possible decompositions, unknowingly trading off correctness, security, complexity, and performance. We present a new conceptual framework embodied in an LLVM-based tool: the Security-Oriented Analysis of Application Programs (SOAAP) that allows programmers to reason about compartmentalization using source-code annotations (compartmentalization hypotheses). We demonstrate considerable benefit when creating new compartmentalizations for complex applications, and analyze existing compartmentalized applications to discover design faults and maintenance issues arising from application evolution.
引用
收藏
页码:1016 / 1031
页数:16
相关论文
共 41 条
  • [1] Anderson, 1972, ESDTR7351 US AIR FOR
  • [2] Cryptographic processors - A surrey
    Anderson, R
    Bond, M
    Clulow, J
    Skorobogatov, S
    [J]. PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 357 - 369
  • [3] [Anonymous], P 13 USENIX SEC S
  • [4] [Anonymous], P IEEE S SEC PRIV OA
  • [5] [Anonymous], P USENIX ANN TECHN C
  • [6] [Anonymous], 2015, P 36 IEEE S SEC PRIV
  • [7] [Anonymous], 2006, THESIS
  • [8] [Anonymous], P USENIX ANN TECHN C
  • [9] [Anonymous], 2004, P INT S COD GEN OPT
  • [10] Belay A., 2012, P 10 C OP SYST DES I