Sciweavers

Share
ICISS
2007
Springer

Towards Automated Privilege Separation

11 years 7 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to protected resources, we can mitigate the threats against the application. Previous examinations of privilege separation either entailed significant manual effort or required access to the source code. We consider a method of performing privilege separation through black-box analysis. We consider similar applications to the target and infer states of execution, and determine unique trigger system calls that cause transitions. We use these for the basis of statebased policy enforcement by leveraging the Systrace policy enforcement mechanism. Our results show that we can infer state transitions with a high degree of accuracy, while our modifications to Systrace result in more granular protection by limiting system calls depending on the application’s state. The modified Systrace increases the size of the Apac...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew
Added 08 Jun 2010
Updated 08 Jun 2010
Type Conference
Year 2007
Where ICISS
Authors Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew McDaniel
Comments (0)
books