Automating Isolation and Least Privilege in Web Services

被引:7
|
作者
Blankstein, Aaron [1 ]
Freedman, Michael J. [1 ]
机构
[1] Princeton Univ, Dept Comp Sci, Princeton, NJ 08544 USA
关键词
security policy inference; isolation; capabilities; principle of least privilege; web security;
D O I
10.1109/SP.2014.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many client-facing applications, a vulnerability in any part can compromise the entire application. This paper describes the design and implementation of Passe, a system that protects a data store from unintended data leaks and unauthorized writes even in the face of application compromise. Passe automatically splits (previously shared-memory-space) applications into sandboxed processes. Passe limits communication between those components and the types of accesses each component can make to shared storage, such as a backend database. In order to limit components to their least privilege, Passe uses dynamic analysis on developer-supplied end-to-end test cases to learn data and control-flow relationships between database queries and previous query results, and it then strongly enforces those relationships. Our prototype of Passe acts as a drop-in replacement for the Django web framework. By running eleven unmodified, off-the-shelf applications in Passe, we demonstrate its ability to provide strong security guarantees Passe correctly enforced 96% of the applications' policies with little additional overhead. Additionally, in the web-specific setting of the prototype, we also mitigate the cross-component effects of cross-site scripting (XSS) attacks by combining browser HTML5 sandboxing techniques with our automatic component separation.
引用
收藏
页码:133 / 148
页数:16
相关论文
共 50 条
  • [31] Research of least privilege for database administrators
    Shen, Mou
    Chen, Mengdong
    Li, Min
    Liu, Lianzhong
    International Journal of Database Theory and Application, 2013, 6 (06): : 39 - 50
  • [32] Game to Dethrone: A Least Privilege CTF
    Wu, Wenjing
    Feng, Wu-chang
    2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 132 - 137
  • [33] Least privilege analysis in software architectures
    Koen Buyens
    Riccardo Scandariato
    Wouter Joosen
    Software & Systems Modeling, 2013, 12 : 331 - 348
  • [34] Least privilege analysis in software architectures
    Buyens, Koen
    Scandariato, Riccardo
    Joosen, Wouter
    SOFTWARE AND SYSTEMS MODELING, 2013, 12 (02): : 331 - 348
  • [35] The Formalization of Least Privilege Mining in RBAC
    Dong, Lijun
    Kang, Xiaojun
    Song, Jun
    Wang, Maocai
    MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES, PTS 1 AND 2, 2011, 480-481 : 1023 - 1027
  • [36] Least Privilege Learning for Attribute Obfuscation
    Brown, Glen
    Martinez-del-Rincon, Jesus
    Miller, Paul
    PATTERN RECOGNITION, ACPR 2021, PT II, 2022, 13189 : 142 - 156
  • [37] Stateful Least Privilege Authorization for the Cloud
    Cao, Leo
    Meng, Luoxi
    Stefan, Deian
    Fernandes, Earlence
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3477 - 3494
  • [38] Automating with the World Wide Web
    Braune, Annerose
    Hiller, Olaf
    Janschek, Klaus
    Werkstatt und Betrieb, 2000, 133 (03): : 28 - 31
  • [39] AUTOMATING WEB HISTORY ANALYSIS
    Sonntag, Michael
    IDIMT-2012: ICT SUPPORT FOR COMPLEX SYSTEMS, 2012, 38 : 313 - 323
  • [40] Automating Web navigation with the WebVCR
    Anupam, V
    Freire, J
    Kumar, B
    Lieuwen, D
    COMPUTER NETWORKS, 2000, 33 (1-6) : 503 - 517