mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party Libraries

被引:0
|
作者
Zhang, Yunming [1 ]
Cai, Quanwei [2 ]
Li, Houqiang [1 ]
Lin, Jingqiang [1 ]
Wang, Wei [3 ]
机构
[1] Univ Sci & Technol China, Hefei 230027, Anhui, Peoples R China
[2] Beijing Zitiao Network Technol Co Ltd, Beijing 100190, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100085, Peoples R China
关键词
Memory Disclosure; Memory encryption; Intel SGX; Isolation; ATTACKS; MEMORY;
D O I
10.1007/978-3-031-64948-6_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Third-party libraries (TPLs) are widely adopted in softwares for integrating special functions (e.g., compression) efficiently. However, as most TPLs are in the same process with the invoker, attackers could exploit memory disclosure vulnerabilities in TPLs to read the sensitive memory data of the victim process. Therefore, once a vulnerability found in a TPL, all softwares with this TPL need to be patched in time, which is impractical. In this paper, we propose a cryptography-based isolation (named mShield) between the data memory of the invoker and TPLs, to prevent TPL vulnerabilities from being exploited to read the invoker's sensitive memory data. mShield performs a user-mode and lightweight memory analysis, figures out the invoker's memory space (including stack, heap, user-defined ones in BSS/data segment), encrypts them before invoking any TPL function, and automatically decrypts them once the function returns, without interrupting the normal execution. mShield performs the encryption/decryption in the trusted environment provided by Intel SGX, which prevents the attacker from reading the cryptographic key, and alerts (i.e., the invoker's decryption fails) in time once the encryption context is tampered with (e.g., by illegal invocations of decryption). We have implemented mShield, and adopted it to protect Nginx against a potentially vulnerable TPL (i.e., zlib). The experiment demonstrates mShield's effectiveness (TPLs fail to read the invoker's plaintext sensitive memory data) and acceptable efficiency (about less than 4x time cost).
引用
收藏
页码:496 / 513
页数:18
相关论文
共 50 条
  • [21] Dynamic Privacy Leakage Analysis of Android Third-party Libraries
    He, Yongzhong
    Hu, Binghui
    Han, Zhen
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 275 - 280
  • [22] CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR Environment
    Lee, Jiyeon
    2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 75 - 76
  • [23] LibSift: Automated Detection of Third-Party Libraries in Android Applications
    Soh, Charlie
    Tan, Hee Beng Kuan
    Arnatovich, Yauhen Leanidavich
    Narayanan, Annamalai
    Wang, Lipo
    2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016), 2016, : 41 - 48
  • [24] Splitting Third-Party Libraries' Privileges from Android Apps
    Zhan, Jiawei
    Zhou, Quan
    Gu, Xiaozhuo
    Wang, Yuewu
    Niu, Yingjiao
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 80 - 94
  • [25] LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications
    Qiu, Jun
    Yang, Xuewu
    Wu, Huamao
    Zhou, Yajin
    Li, Jinku
    Ma, Jianfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2873 - 2889
  • [26] Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
    Zhao, Kaifa
    Zhan, Xian
    Yu, Le
    Zhou, Shiyao
    Zhou, Hao
    Luo, Xiapu
    Wang, Haoyu
    Liu, Yepang
    Proceedings - International Conference on Software Engineering, 2023, : 1583 - 1595
  • [27] LIBID: Reliable Identification of Obfuscated Third-Party Android Libraries
    Zhang, Jiexin
    Beresford, Alastair R.
    Kolhnann, Stephan A.
    PROCEEDINGS OF THE 28TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA '19), 2019, : 55 - 65
  • [28] Third-party intervention and the Civil War process
    Balch-Lindsay, Dylan
    Enterline, Andrew J.
    Joyce, Kyle A.
    JOURNAL OF PEACE RESEARCH, 2008, 45 (03) : 345 - 363
  • [29] Leakage of Sensitive Information to Third-Party Voice Applications
    Bispham, Mary
    Zard, Clara
    Sattar, Suliman
    Ferrer-Aran, Xavier
    Suarez-Tangil, Guillermo
    Such, Jose
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2022, 2022,
  • [30] Eutherian third-party data gene collections
    Premzl, Marko
    GENE REPORTS, 2019, 16