Bitte benutzen Sie diese Kennung, um auf die Ressource zu verweisen: https://doi.org/10.21256/zhaw-18635
Publikationstyp: Konferenz: Paper
Art der Begutachtung: Peer review (Publikation)
Titel: Downright : a framework and toolchain for privilege handling
Autor/-in: Neuhaus, Stephan
Schweizer, Remo
et. al: No
DOI: 10.1109/SecDev.2019.00019
10.21256/zhaw-18635
Erschienen in: Proceedings of the IEEE
Tagungsband: Proceedings of the 2019 IEEE Secure Development (SecDev) Conference
Angaben zur Konferenz: IEEE SecDev 2019, McLean, USA, 25 - 27 September 2019
Erscheinungsdatum: 2019
Verlag / Hrsg. Institution: IEEE
ISBN: 978-1-5386-7289-1
ISSN: 0018-9219
Sprache: Englisch
Schlagwörter: Security; Privileges; Linux; Unix
Fachgebiet (DDC): 005: Computerprogrammierung, Programme und Daten
Zusammenfassung: We propose Downright, a novel framework based on Seccomp, Berkeley Packet Filter, and PTrace, that makes it possible to equip new and existing C applications with a request broker architecture. An extensive configuration language allows AppArmor-like configuration that supports programmers in building rules for system call parameter validation and result sanitization. Access to these privileged function calls can be restricted both within Linux kernel and user spaces. Downright's main strength compared to related approaches is that it implements a complete mediation request broker architecture, in which all system calls are vetted before execution, either by the kernel or by a request broker, which runs as another process. This isolates the main program from many failures due to programming bugs and attacks, which would have to pass not only the attacked program, but the request broker also. We argue that this makes acquiring and releasing elevated privileges easier and safer. Downright eliminates the need to write Seccomp programs, instead allowing policies to be expressed declaratively through a rich policy language. We demonstrate the viability of this approach by instrumenting nginx, an industrial-strength web server and reverse proxy. While this instrumentation takes only a single line of code, we argue that even this effort can be avoided by suitable C runtime code. We show that Downright's overhead is substantial, halving nginx's perfomance, but propose measures for optimisation.
Weitere Angaben: © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
URI: https://digitalcollection.zhaw.ch/handle/11475/18635
Volltext Version: Akzeptierte Version
Lizenz (gemäss Verlagsvertrag): Lizenz gemäss Verlagsvertrag
Departement: School of Engineering
Organisationseinheit: Institut für Angewandte Informationstechnologie (InIT)
Enthalten in den Sammlungen:Publikationen School of Engineering

Dateien zu dieser Ressource:
Datei Beschreibung GrößeFormat 
main.pdf285.05 kBAdobe PDFMiniaturbild
Öffnen/Anzeigen


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt, soweit nicht anderweitig angezeigt.