Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis

被引:0
作者
Chang, Walter [1 ]
Streiff, Brandon [1 ]
Lin, Calvin [1 ]
机构
[1] Univ Texas Austin, Dept Comp Sci, Austin, TX 78712 USA
来源
CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2008年
关键词
Dynamic Data Flow Analysis; Security Enforcement; Static Analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper. we solve both of these issues with an extensible system that is an order of magnitude more efficient than previous software taint tracking systems and is fully general to dynamic data flow tracking problems. Our system uses a compiler to transform untrusted programs into policy-enforcing programs, and our system can be easily reconfigured to support new analyses and policies without modifying the compiler or runtime system, Our system uses a sound and sophisticated static analysis that can dramatically reduce the amount of data that must be dynamically tracked. For server programs, our system's average overhead is 0.65% for taint tracking, which is comparable to the best hardware-based solutions. For it set of compute-bound benchmarks, our system produces no runtime overhead because Our compiler can prove the absence of vulnerabilities, eliminating the need to dynamically track taint. After modifying these benchmarks to contain format string vulnerabilities, our system's overhead is less than 13%, which is over 6x lower than the previous best solutions. We demonstrate the flexibility and power Of Our system by applying it to file disclosure vulnerabilities, a problem that taint tracking cannot handle. To prevent Such vulnerabilities, Our system introduces an average runtime overhead of 0.25% for three open source server programs.
引用
收藏
页码:39 / 50
页数:12
相关论文
共 48 条
[11]  
Castro M, 2006, Usenix Association 7th Usenix Symposium on Operating Systems Design and Implementation, P147
[12]  
Chen S, 2005, I C DEPEND SYS NETWO, P378
[13]  
Clause J., 2007, P 2007 INT S SOFTW T, P196
[14]  
Cowan C, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P63
[15]  
Cowan C, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P91
[16]  
Crandall JR, 2004, INT SYMP MICROARCH, P221
[17]  
Dalton M, 2007, CONF PROC INT SYMP C, P482, DOI 10.1145/1273440.1250722
[18]   LATTICE MODEL OF SECURE INFORMATION-FLOW [J].
DENNING, DE .
COMMUNICATIONS OF THE ACM, 1976, 19 (05) :236-243
[19]  
ERLINGSSON U, 2003, THESIS CORNELL U ITH
[20]   Improving security using extensible lightweight static analysis [J].
Evans, D ;
Larochelle, D .
IEEE SOFTWARE, 2002, 19 (01) :42-+