Automating Isolation and Least Privilege in Web Services

被引:7
|
作者
Blankstein, Aaron [1 ]
Freedman, Michael J. [1 ]
机构
[1] Princeton Univ, Dept Comp Sci, Princeton, NJ 08544 USA
关键词
security policy inference; isolation; capabilities; principle of least privilege; web security;
D O I
10.1109/SP.2014.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many client-facing applications, a vulnerability in any part can compromise the entire application. This paper describes the design and implementation of Passe, a system that protects a data store from unintended data leaks and unauthorized writes even in the face of application compromise. Passe automatically splits (previously shared-memory-space) applications into sandboxed processes. Passe limits communication between those components and the types of accesses each component can make to shared storage, such as a backend database. In order to limit components to their least privilege, Passe uses dynamic analysis on developer-supplied end-to-end test cases to learn data and control-flow relationships between database queries and previous query results, and it then strongly enforces those relationships. Our prototype of Passe acts as a drop-in replacement for the Django web framework. By running eleven unmodified, off-the-shelf applications in Passe, we demonstrate its ability to provide strong security guarantees Passe correctly enforced 96% of the applications' policies with little additional overhead. Additionally, in the web-specific setting of the prototype, we also mitigate the cross-component effects of cross-site scripting (XSS) attacks by combining browser HTML5 sandboxing techniques with our automatic component separation.
引用
收藏
页码:133 / 148
页数:16
相关论文
共 50 条
  • [11] Automating Property-based Testing of Evolving Web Services
    Li, Huiqing
    Thompson, Simon
    Seijas, Pablo Lamela
    Angel Francisco, Miguel
    PEPM '14: PROCEEDINGS OF THE ACM SIGPLAN WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION, 2014, : 169 - 180
  • [12] Automating execution of Web Services for ontology based information integration
    Grasic, Bostjan
    Podgorelec, Vili
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, MAN-MACHINE SYSTEMS AND CYBERNETICS (CIMMACS '09), 2009, : 128 - +
  • [13] An approach to automating the integration of the Access Control Policies for Web Services
    Alodib, Mohammed
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 181 - 187
  • [14] A Preference Profile for Automating Web Services Conversation in Mobile Environment
    Lee, Kangchan
    Lee, Wonsuk
    Jeon, Jonghong
    Lee, Seungyun
    Park, Jonghun
    2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 2891 - 2895
  • [15] Least privilege and more
    Schneider, FB
    COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 253 - 258
  • [16] Least privilege and more
    Cornell University
    不详
    不详
    IEEE Security and Privacy, 2003, 1 (05): : 55 - 59
  • [17] Automating the Web
    Fisher, D
    FORBES, 1999, 164 (13): : 220 - +
  • [18] Towards intelligent web services for-automating medical service composition
    Lee, Y
    Patel, C
    Chun, SA
    Geller, J
    IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2004, : 384 - 391
  • [19] Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services
    Huang, Yih
    Ghosh, Anup K.
    2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, : 114 - 117
  • [20] WebJail: Least-privilege Integration of Third-party Components in Web Mashups
    Van Acker, Steven
    De Ryck, Philippe
    Desmet, Lieven
    Piessens, Frank
    Joosen, Wouter
    27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 307 - 316