Automating Isolation and Least Privilege in Web Services

被引:7
|
作者
Blankstein, Aaron [1 ]
Freedman, Michael J. [1 ]
机构
[1] Princeton Univ, Dept Comp Sci, Princeton, NJ 08544 USA
关键词
security policy inference; isolation; capabilities; principle of least privilege; web security;
D O I
10.1109/SP.2014.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many client-facing applications, a vulnerability in any part can compromise the entire application. This paper describes the design and implementation of Passe, a system that protects a data store from unintended data leaks and unauthorized writes even in the face of application compromise. Passe automatically splits (previously shared-memory-space) applications into sandboxed processes. Passe limits communication between those components and the types of accesses each component can make to shared storage, such as a backend database. In order to limit components to their least privilege, Passe uses dynamic analysis on developer-supplied end-to-end test cases to learn data and control-flow relationships between database queries and previous query results, and it then strongly enforces those relationships. Our prototype of Passe acts as a drop-in replacement for the Django web framework. By running eleven unmodified, off-the-shelf applications in Passe, we demonstrate its ability to provide strong security guarantees Passe correctly enforced 96% of the applications' policies with little additional overhead. Additionally, in the web-specific setting of the prototype, we also mitigate the cross-component effects of cross-site scripting (XSS) attacks by combining browser HTML5 sandboxing techniques with our automatic component separation.
引用
收藏
页码:133 / 148
页数:16
相关论文
共 50 条
  • [1] Least-Privilege Calls to Amazon Web Services
    Gill, Puneet
    Dietl, Werner
    Tripunitara, Mahesh
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2085 - 2096
  • [2] On automating Web services discovery
    Boualem Benatallah
    Mohand-Said Hacid
    Alain Leger
    Christophe Rey
    Farouk Toumani
    The VLDB Journal, 2005, 14 : 84 - 96
  • [3] Automating the procurement of web services
    Martín-Díaz, O
    Ruiz-Cortés, A
    Durán, A
    Benavides, D
    Toro, M
    SERVICE-ORIENTED COMPUTING - ICSOC 2003, 2003, 2910 : 91 - 103
  • [4] On automating Web services discovery
    Benatallah, B
    Hacid, MS
    Leger, A
    Rey, C
    Toumani, F
    VLDB JOURNAL, 2005, 14 (01): : 84 - 96
  • [5] Automating the composition of transactional Web services
    Montagut, Frederic
    Molva, Refik
    Golega, Silvan Tecumseh
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2008, 5 (01) : 24 - 41
  • [6] Watching the watchmen: Least privilege for managed network services
    Liu, Guyue
    Li, Ao
    Canel, Christopher
    Sekar, Vyas
    PROCEEDINGS OF THE THE 20TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS, HOTNETS 2021, 2021, : 147 - 154
  • [7] Concurrency issues in automating RTS for web services
    Ruth, Michael
    Tu, Shengru
    2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 1142 - +
  • [8] Automating integration of manufacturing systems and services: A Semantic Web Services approach
    Yang, ZH
    Gay, R
    Miao, CY
    Zhang, JB
    Shen, ZQ
    Zhuang, LQ
    Lee, HM
    IECON 2005: THIRTY-FIRST ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-3, 2005, : 2255 - 2260
  • [9] Pattern templates for automating business choreography on Web services
    Paik, Incheon
    Suzuki, Hiroto
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 512 - +
  • [10] Isolation and Web Services transactions
    Paul, David
    Henskens, Frans
    Hannaford, Michael
    EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 181 - 182