Automating Isolation and Least Privilege in Web Services

被引:7
|
作者
Blankstein, Aaron [1 ]
Freedman, Michael J. [1 ]
机构
[1] Princeton Univ, Dept Comp Sci, Princeton, NJ 08544 USA
关键词
security policy inference; isolation; capabilities; principle of least privilege; web security;
D O I
10.1109/SP.2014.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many client-facing applications, a vulnerability in any part can compromise the entire application. This paper describes the design and implementation of Passe, a system that protects a data store from unintended data leaks and unauthorized writes even in the face of application compromise. Passe automatically splits (previously shared-memory-space) applications into sandboxed processes. Passe limits communication between those components and the types of accesses each component can make to shared storage, such as a backend database. In order to limit components to their least privilege, Passe uses dynamic analysis on developer-supplied end-to-end test cases to learn data and control-flow relationships between database queries and previous query results, and it then strongly enforces those relationships. Our prototype of Passe acts as a drop-in replacement for the Django web framework. By running eleven unmodified, off-the-shelf applications in Passe, we demonstrate its ability to provide strong security guarantees Passe correctly enforced 96% of the applications' policies with little additional overhead. Additionally, in the web-specific setting of the prototype, we also mitigate the cross-component effects of cross-site scripting (XSS) attacks by combining browser HTML5 sandboxing techniques with our automatic component separation.
引用
收藏
页码:133 / 148
页数:16
相关论文
共 50 条
  • [41] Automating web page prints
    Xue, J
    DR DOBBS JOURNAL, 2004, 29 (05): : S14 - S14
  • [42] A New Approach to Automating Services
    Lacity, Mary C.
    Willcocks, Leslie P.
    MIT SLOAN MANAGEMENT REVIEW, 2016, 58 (01) : 41 - 49
  • [43] Enforcing the principle of least privilege with a state-based privilege control model
    Liang, B
    Liu, H
    Shi, WC
    Wu, YJ
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 109 - 120
  • [44] Maintaining consistency under isolation relaxation of web services transactions
    Choi, S
    Jang, H
    Kim, H
    Kim, J
    Kim, SM
    Song, J
    Lee, YJ
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2005, 2005, 3806 : 245 - 257
  • [45] A study of least privilege in CapBasED-AMS
    Hung, PCK
    Karlapalem, K
    Gray, JW
    3RD IFCIS INTERNATIONAL CONFERENCE ON COOPERATIVE INFORMATION SYSTEMS - PROCEEDINGS, 1998, : 208 - 217
  • [46] LeMo: Protecting Kernel with Least Privilege Modules
    Zhou, Hongwei
    Yuan, Jinhui
    Zhang, Kai
    Zhu, Xuhua
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 349 - 353
  • [47] Least privilege security in CapBasED-AMS
    Hung, PCK
    Karlapalem, K
    Gray, J
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 1999, 8 (2-3) : 139 - 168
  • [48] A Persona Framework for Attribution, Delegation and Least Privilege
    Chandersekaran, Coimbatore S.
    Simpson, William R.
    IMCIC 2010: INTERNATIONAL MULTI-CONFERENCE ON COMPLEXITY, INFORMATICS AND CYBERNETICS, VOL II, 2010, : 84 - 89
  • [49] Are chrome extensions compliant with the spirit of least privilege?
    Picazo-Sanchez, Pablo
    Ortiz-Martin, Lara
    Schneider, Gerardo
    Sabelfeld, Andrei
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (06) : 1283 - 1297
  • [50] A SAML Framework for Attribution, Delegation and Least Privilege
    Chandersekaran, Coimbatore S.
    Simpson, William R.
    IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 303 - 308