Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Formal Modeling and Security Analysis for Intra-level Privilege Separation
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 88–101https://doi.org/10.1145/3564625.3567984Privileged system software such as mainstream operating system kernels and hypervisors have an ongoing stream of vulnerabilities. Even the inflated secure world in Trusted Execution Environment (TEE) is no longer secure in complex real-world scenarios. ...
- research-articleJune 2021
Cali: Compiler-Assisted Library Isolation
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityPages 550–564https://doi.org/10.1145/3433210.3453111Software libraries can freely access the program's entire address space, and also inherit its system-level privileges. This lack of separation regularly leads to security-critical incidents once libraries contain vulnerabilities or turn rogue. We ...
- research-articleJune 2020
SelMon: reinforcing mobile device security with self-protected trust anchor
MobiSys '20: Proceedings of the 18th International Conference on Mobile Systems, Applications, and ServicesPages 135–147https://doi.org/10.1145/3386901.3389023Higher privileged trust anchors such as thin hypervisors and Trust-Zone have been adopted to protect mobile OSs. For instance, the Samsung Knox security platform implements a kernel integrity monitor based on a hardware-assisted virtualization technique ...
- research-articleNovember 2019
Program-mandering: Quantitative Privilege Separation
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1023–1040https://doi.org/10.1145/3319535.3354218Privilege separation is an effective technique to improve software security. However, past partitioning systems do not allow programmers to make quantitative tradeoffs between security and performance. In this paper, we describe our toolchain called PM. ...
- research-articleFebruary 2019
Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege Separation
ACM Transactions on Privacy and Security (TOPS), Volume 22, Issue 2Article No.: 10, Pages 1–30https://doi.org/10.1145/3309698Security monitoring has long been considered as a fundamental mechanism to mitigate the damage of a security attack. Recently, intra-level security systems have been proposed that can efficiently and securely monitor system software without any ...
- research-articleOctober 2018
Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 1441–1454https://doi.org/10.1145/3243734.3243748Modern applications often involve processing of sensitive information. However, the lack of privilege separation within the user space leaves sensitive application secret such as cryptographic keys just as unprotected as a "hello world" string. Cutting-...
- research-articleApril 2018
Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs
HoTSoS '18: Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of SecurityArticle No.: 3, Pages 1–9https://doi.org/10.1145/3190619.3190635The principle of least privilege requires that components of a program have access to only those resources necessary for their proper function. Defining proper function is a difficult task. Existing methods of privilege separation, like Control Flow ...
- research-articleAugust 2017
Cimplifier: automatically debloating containers
ESEC/FSE 2017: Proceedings of the 2017 11th Joint Meeting on Foundations of Software EngineeringPages 476–486https://doi.org/10.1145/3106237.3106271Application containers, such as those provided by Docker, have recently gained popularity as a solution for agile and seamless software deployment. These light-weight virtualization environments run applications that are packed together with their ...
- research-articleOctober 2016
Enforcing Least Privilege Memory Views for Multithreaded Applications
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 393–405https://doi.org/10.1145/2976749.2978327Failing to properly isolate components in the same address space has resulted in a substantial amount of vulnerabilities. Enforcing the least privilege principle for memory accesses can selectively isolate software components to restrict attack surface ...
- research-articleMarch 2014
Compac: enforce component-level access control in android
CODASPY '14: Proceedings of the 4th ACM conference on Data and application security and privacyPages 25–36https://doi.org/10.1145/2557547.2557560In Android applications, third-party components may bring potential security problems, because they have the same privilege as the applications but cannot be fully trusted. It is desirable if their privileges can be restricted. To minimize the privilege ...
- research-articleOctober 2012
Enforcing user-space privilege separation with declarative architectures
STC '12: Proceedings of the seventh ACM workshop on Scalable trusted computingPages 9–20https://doi.org/10.1145/2382536.2382541Applying privilege separation in software development is an effective strategy for limiting the damage of an attack on a software system. In this approach, a software system is separated into a set of communicating protection domains of least privilege. ...
- short-paperMarch 2011
Diesel: applying privilege separation to database access
ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications SecurityPages 416–422https://doi.org/10.1145/1966913.1966971Database-backed applications typically grant complete database access to every part of the application. In this scenario, a flaw in one module can expose data that the module never uses for legitimate purposes. Drawing parallels to traditional privilege ...
- ArticleDecember 2010
Enhanced Privilege Separation for Commodity Software on Virtualized Platform
ICPADS '10: Proceedings of the 2010 IEEE 16th International Conference on Parallel and Distributed SystemsPages 275–282https://doi.org/10.1109/ICPADS.2010.96Conventional privilege separation can effectively reduce the TCB size by granting privilege to only the privileged compartments. However, since they this approach relies on process isolation to ensure security assurance, malware exploiting against ...
- research-articleApril 2010
Fine-grained privilege separation for web applications
WWW '10: Proceedings of the 19th international conference on World wide webPages 551–560https://doi.org/10.1145/1772690.1772747We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are divided into isolated, privilege-separated components, enabling rich security ...