Efficient and Extensible Security Enforcement Using Dynamic Data Flow Analysis

被引:0
|
作者
Chang, Walter [1 ]
Streiff, Brandon [1 ]
Lin, Calvin [1 ]
机构
[1] Univ Texas Austin, Dept Comp Sci, Austin, TX 78712 USA
关键词
Dynamic Data Flow Analysis; Security Enforcement; Static Analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper. we solve both of these issues with an extensible system that is an order of magnitude more efficient than previous software taint tracking systems and is fully general to dynamic data flow tracking problems. Our system uses a compiler to transform untrusted programs into policy-enforcing programs, and our system can be easily reconfigured to support new analyses and policies without modifying the compiler or runtime system, Our system uses a sound and sophisticated static analysis that can dramatically reduce the amount of data that must be dynamically tracked. For server programs, our system's average overhead is 0.65% for taint tracking, which is comparable to the best hardware-based solutions. For it set of compute-bound benchmarks, our system produces no runtime overhead because Our compiler can prove the absence of vulnerabilities, eliminating the need to dynamically track taint. After modifying these benchmarks to contain format string vulnerabilities, our system's overhead is less than 13%, which is over 6x lower than the previous best solutions. We demonstrate the flexibility and power Of Our system by applying it to file disclosure vulnerabilities, a problem that taint tracking cannot handle. To prevent Such vulnerabilities, Our system introduces an average runtime overhead of 0.25% for three open source server programs.
引用
收藏
页码:39 / 50
页数:12
相关论文
共 50 条
  • [1] Dynamic Security Policies Enforcement and Adaptation using Aspects
    Idrees, Muhammad Sabir
    Ayed, Samiha
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1374 - 1379
  • [2] Improving security using extensible lightweight static analysis
    Evans, D
    Larochelle, D
    [J]. IEEE SOFTWARE, 2002, 19 (01) : 42 - +
  • [3] Efficient Network Security Policy Enforcement With Policy Space Analysis
    Wang, Xiang
    Shi, Weiqi
    Xiang, Yang
    Li, Jun
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 2958 - 2970
  • [4] Formal and efficient enforcement of security policies
    Langar, A
    Mejri, M
    [J]. FCS '05: Proceedings of the 2005 International Conference on Foundations of Computer Science, 2005, : 143 - 149
  • [5] Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling
    Li, Qi
    Deng, Xinhao
    Liu, Zhuotao
    Yang, Yuan
    Zou, Xiaoyue
    Wang, Qian
    Xu, Mingwei
    Wu, Jianping
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 486 - 499
  • [6] Dynamic Security Policy Enforcement on Android
    Vanco, Matus
    Aron, Lukas
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 141 - 148
  • [7] Runtime Enforcement of Dynamic Security Policies
    Horcas, Jose-Miguel
    Pinto, Monica
    Fuentes, Lidia
    [J]. SOFTWARE ARCHITECTURE, ECSA 2014, 2014, 8627 : 340 - 356
  • [8] Simple Security Using Flow Data
    Futamura, Kenichi
    [J]. 2009 18TH ANNUAL WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2009), 2009, : 79 - 82
  • [9] Policy Enforcement for Big Data security
    Al-Shomrani, Abdullah
    Fathy, Fathy
    Jambi, Kamal
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 70 - 74
  • [10] Efficient security policy enforcement for the mobile environment
    Atluri, Vijayalakshmi
    Shin, Heechang
    Vaidya, Jaideep
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 439 - 475