Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3623278.3624760acmconferencesArticle/Chapter ViewAbstractPublication PagesasplosConference Proceedingsconference-collections
research-article
Open access

FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation

Published: 07 February 2024 Publication History
  • Get Citation Alerts
  • Abstract

    Data processing oriented software, especially machine learning applications, are heavily dependent on standard frameworks/libraries such as TensorFlow and OpenCV. As those frameworks have gained significant popularity, the exploitation of vulnerabilities in the frameworks has become a critical security concern. While software isolation can minimize the impact of exploitation, existing approaches suffer from difficulty analyzing complex program dependencies or excessive overhead, making them ineffective in practice.
    We propose FreePart, a framework-focused software partitioning technique specialized for data processing applications. It is based on an observation that the execution of a data processing application, including data flows and usage of critical data, is closely related to the invocations of framework APIs. Hence, we conduct a temporal partitioning of the host application's execution based on the invocations of framework APIs and the data objects used by the APIs. By focusing on data accesses at runtime instead of static program code, it provides effective and practical isolation from the perspective of data. Our evaluation on 23 applications using popular frameworks (e.g., OpenCV, Caffe, PyTorch, and TensorFlow) shows that FreePart is effective against all attacks composed of 18 real-world vulnerabilities with a low overhead (3.68%).

    References

    [1]
    R.P. Abbott, Lawrence Livermore Laboratory, Institute for Computer Sciences, and Technology. Security Analysis and Enhancements of Computer Operating Systems: The RISOS Project, Lawrence Livermore Laboratory. U.S. Department of Commerce, National Bureau of Standards, 1976.
    [2]
    Adam Geitgey. The world's simplest facial recognition api for Python and the command line, 2020. https://github.com/ageitgey/face_recognition.
    [3]
    Hiralal Agrawal and Joseph R. Horgan. Dynamic program slicing. SIGPLAN Not., 25(6):246--256, June 1990.
    [4]
    Ionut Arghire. Serious Vulnerabilities Patched in OpenCV Computer Vision Library, 2020. https://www.securityweek.com/serious-vulnerabilities-patched-opencv-computer-vision-library.
    [5]
    Octavio Arriaga, Matias Valdenegro-Toro, and Paul Plöger. Real-time convolutional neural networks for emotion and gender classification. arXiv preprint arXiv:1710.07557, 2017.
    [6]
    Anish Athalye, Nicholas Carlini, and David Wagner. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, July 2018.
    [7]
    Elias Athanasopoulos, Vasileios P Kemerlis, Georgios Portokalidis, and Angelos D Keromytis. Nacldroid: Native code isolation for android applications. In European Symposium on Research in Computer Security, pages 422--439. Springer, 2016.
    [8]
    Autoit. Autoit. https://www.autoitscript.com/site/.
    [9]
    Krishnakumar Balasubramanian and Saeed Ghadimi. Zeroth-order (non)-convex stochastic optimization via conditional gradient and gradient updates. In Proceedings of the 32nd International Conference on Neural Information Processing Systems, NIPS'18, page 3459--3468, Red Hook, NY, USA, 2018. Curran Associates Inc.
    [10]
    Markus Bauer and Christian Rossow. Cali: Compiler-assisted library isolation. In Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, ASIA CCS '21, page 550--564, New York, NY, USA, 2021. Association for Computing Machinery.
    [11]
    Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. Wedge: Splitting applications into reduced-privilege compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, pages 309--322, USA, 2008. USENIX Association.
    [12]
    Ajay Brahmakshatriya, Piyus Kedia, Derrick P McKee, Deepak Garg, Akash Lal, Aseem Rastogi, Hamed Nemati, Anmol Panda, and Pratik Bhatu. Confllvm: A compiler for enforcing data confidentiality in low-level code. In Proceedings of the Fourteenth EuroSys Conference 2019, pages 1--15, 2019.
    [13]
    David Brumley and Dawn Song. Privtrans: Automatically partitioning programs for privilege separation. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04, page 5, USA, 2004. USENIX Association.
    [14]
    Zhe Cao, T. Simon, Shih-En Wei, and Yaser Sheikh. Realtime multi-person 2d pose estimation using part affinity fields. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 1302--1310, 2017.
    [15]
    Nicholas Carlini and D. Wagner. Towards evaluating the robustness of neural networks. 2017 IEEE Symposium on Security and Privacy (SP), pages 39--57, 2017.
    [16]
    cchen156. Learning-to-See-in-the-Dark. https://github.com/cchen156/Learning-to-See-in-the-Dark.
    [17]
    Mohamed Chaabane. Autonomous-flight-of-the-drone-AR.Drone-1.0. https://github.com/MedChaabane/Autonomous-flight-of-the-drone-AR.Drone-using-OpenCV.
    [18]
    Yunjey Choi, Minje Choi, Munyoung Kim, Jung-Woo Ha, Sunghun Kim, and Jaegul Choo. StarGAN: Unified Generative Adversarial Networks for Multi-Domain Image-to-Image Translation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018.
    [19]
    Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng. Secure web applications via automatic partitioning. SIGOPS Oper. Syst. Rev., 41(6):31--44, October 2007.
    [20]
    Chris Lattner and Vikram Adve. llvm-cov tool shows code coverage information for programs, 2020. https://llvm.org/docs/CommandGuide/llvm-cov.html.
    [21]
    Kenneth T. Co, Luis Muñoz González, Sixte de Maupeou, and Emil C. Lupu. Procedural noise adversarial examples for black-box attacks on deep convolutional networks. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS '19, page 275--289, New York, NY, USA, 2019. Association for Computing Machinery.
    [22]
    CVE. CVE-2017-12597. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12597.
    [23]
    CVE. CVE-2019-19781 - Vulnerability in Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance, 2019. https://support.citrix.com/article/CTX267027.
    [24]
    Jia Deng, R. Socher, Li Fei-Fei, Wei Dong, Kai Li, and Li-Jia Li. Imagenet: A large-scale hierarchical image database. In 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), volume 00, pages 248--255, 06 2009.
    [25]
    Adam Doupé, Weidong Cui, Mariusz Jakubowski, Marcus Peinado, Christopher Kruegel, and Giovanni Vigna. dedacota: toward preventing server-side xss via automatic code and data separation. pages 1205--1216, 11 2013.
    [26]
    Erik Linder-Norén. PyTorch implementations of Generative Adversarial Networks., 2020. https://github.com/eriklindernoren/PyTorch-GAN.
    [27]
    Evan Shelhamer. Caffe Deep learning framework. https://caffe.berkeleyvision.org/.
    [28]
    FaceBook. Facebook AI Research Sequence-to-Sequence Toolkit written in Python., 2020. https://github.com/pytorch/fairseq.
    [29]
    Moreno Falaschi, Maurizio Gabbrielli, Carlos Olarte, and Catuscia Palamidessi. Slicing concurrent constraint programs. In International Symposium on Logic-Based Program Synthesis and Transformation, pages 76--93. Springer, 2016.
    [30]
    FreePart. FreePart Code Release, 2020. https://github.com/freepart2022/FreePart-22.
    [31]
    Adrien Ghosn, Marios Kogias, Mathias Payer, James R. Larus, and Edouard Bugnion. Enclosure: Language-based restriction of untrusted libraries. In Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '21, page 255--267, New York, NY, USA, 2021. Association for Computing Machinery.
    [32]
    GitHub. GitHub Stars, 2020. ttps://stars.github.com/.
    [33]
    Google. Google/sandboxed-api: Generates sandboxes for c/c++ libraries automatically. https://github.com/google/sandboxed-api.
    [34]
    Jinyu Gu, Hao Li, Wentai Li, Yubin Xia, and Haibo Chen. EPK: Scalable and efficient memory protection keys. In 2022 USENIX Annual Technical Conference (USENIX ATC 22), pages 609--624, Carlsbad, CA, July 2022. USENIX Association.
    [35]
    guanshuicheng. Invoice, 2021. https://github.com/guanshuicheng/invoice.
    [36]
    Khilan Gudka, Robert N.M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, and Alex Richardson. Clean application compartmentalization with soaap. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, page 1016--1031, New York, NY, USA, 2015. Association for Computing Machinery.
    [37]
    Ankit Gupta. What is OpenCV and why is it so popular?, 2019. https://medium.com/analytics-vidhya/what-and-why-opencv-3b807ade73a0.
    [38]
    Mohammad Hedayati, Spyridoula Gravani, Ethan Johnson, John Criswell, Michael L. Scott, Kai Shen, and Mike Marty. Hodor: Intra-Process isolation for High-Throughput data plane libraries. In 2019 USENIX Annual Technical Conference (USENIX ATC 19), pages 489--504, Renton, WA, July 2019. USENIX Association.
    [39]
    Huadong Liao. CapsNet. https://github.com/naturomics/CapsNet-Tensorflow.
    [40]
    Casen Hunger, Lluis Vilanova, Charalampos Papamanthou, Yoav Etsion, and Mohit Tiwari. Dats-data containers for web applications. In Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, pages 722--736, 2018.
    [41]
    Bumjin Im, Fangfei Yang, Chia-Che Tsai, Michael LeMay, Anjo Vahldiek-Oberwagner, and Nathan Dautenhahn. The endokernel: Fast, secure, and programmable subprocess virtualization. CoRR, abs/2108.03705, 2021.
    [42]
    Joel Ibaceta. Video to Ascii. https://github.com/joelibaceta/video-to-ascii.
    [43]
    Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, and Kevin Hamlen. BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. In 13th ACM ASIA Conference on Information, Computer and Communications Security, Songdo, Korea, June 2018.
    [44]
    Douglas Kilpatrick. Privman: A library for partitioning applications. In 2003 USENIX Annual Technical Conference (USENIX ATC 03), San Antonio, TX, June 2003. USENIX Association.
    [45]
    Dohyeong Kim, Yonghwi Kwon, William N. Sumner, Xiangyu Zhang, and Dongyan Xu. Dual execution for on the fly fine grained execution comparison. SIGARCH Comput. Archit. News, 43(1):325--338, March 2015.
    [46]
    kuangliu. MTCNN with pycaffe. https://github.com/kuangliu/pycaffe-mtcnn.
    [47]
    Yonghwi Kwon, Dohyeong Kim, William Nick Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu. Ldx: Causality inference by lightweight dual execution. In Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '16, page 503--515, New York, NY, USA, 2016. Association for Computing Machinery.
    [48]
    Kyle McDonald. Real time deformable face tracking in C++ with OpenCV 3.
    [49]
    Lindsey O'Donnell. Chinese Hackers Exploit Cisco, Citrix Flaws in Massive Espionage Campaign, 2020. https://threatpost.com/chinese-hackers-exploit-cisco-citrix-espionage/154133/.
    [50]
    Shen Liu, Gang Tan, and Trent Jaeger. Ptrsplit: Supporting general pointers in automatic program partitioning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 2359--2371, 2017.
    [51]
    Shen Liu, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Stephen McCamant, Trent Jaeger, and Gang Tan. Program-mandering: Quantitative privilege separation. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pages 1023--1040, 2019.
    [52]
    Tao Liu, Zihao Liu, Qi Liu, Wujie Wen, Wenyao Xu, and Ming Li. Stegonet: Turn deep neural network into a stegomalware. In Annual Computer Security Applications Conference, pages 928--938, 2020.
    [53]
    WJ Liu. MComix3. https://github.com/multiSnow/mcomix3.
    [54]
    Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, and Yubin Xia. Thwarting memory disclosure with efficient hypervisor-enforced intra-domain isolation. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS'15, page 1607--1619, New York, NY, USA, 2015. Association for Computing Machinery.
    [55]
    Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, and Yubin Xia. Thwarting memory disclosure with efficient hypervisor-enforced intra-domain isolation. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS'15, page 1607--1619, New York, NY, USA, 2015. Association for Computing Machinery.
    [56]
    Logan Engstrom. Style transfer. https://github.com/lengstrom/fast-style-transfer.
    [57]
    lukemelas. A PyTorch implementation of EfficientNet, 2020. https://github.com/lukemelas/EfficientNet-PyTorch.
    [58]
    Spiros Mancoridis, Brian Mitchell, Yih-Farn Chen, and Emden Gansner. Bunch: A clustering tool for the recovery and maintenance of software system structures. 04 1999.
    [59]
    Linux manual page. Linux Programmer's Manual dynamic linker/loader. https://man7.org/linux/man-pages/man8/ld.so.8.html.
    [60]
    MComix. MComix: GTK+ comic book viewer. https://sourceforge.net/p/mcomix/wiki/Home/.
    [61]
    Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. Deep-fool: A simple and accurate method to fool deep neural networks. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 2574--2582, 2016.
    [62]
    Nagadomi. A Face detector for anime/manga using OpenCV, 2018. https://github.com/nagadomi/lbpcascade_animeface.
    [63]
    Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, and Deian Stefan. Retrofitting fine grain isolation in the firefox renderer. In 29th USENIX Security Symposium (USENIX Security 20), pages 699--716. USENIX Association, August 2020.
    [64]
    Ned Batchelder. Code coverage measurement for Python, 2020. https://github.com/nedbat/coveragepy.
    [65]
    OpenCV. Extra data for the OpenCV library. https://github.com/opencv/opencv_extra.
    [66]
    OpenCV. Test code for the OpenCV library. https://github.com/opencv/opencv/tree/master/modules/core/test.
    [67]
    OpenCV. OpenCV object detection example. https://github.com/opencv/opencv/blob/master/samples/python/tutorial_code/objectDetection/cascade_classifier/objectDetection.py.
    [68]
    OpenCV. OpenCV Project. https://opencv.org/.
    [69]
    OpenCV. Performance testing in OpenCV. https://github.com/opencv/opencv/wiki/HowToUsePerfTests.
    [70]
    OpenCV. Samples for the OpenCV library. https://github.com/opencv/opencv/tree/master/samples.
    [71]
    OpenCV. Open Source Computer Vision, 2020. https://docs.opencv.org/4.1.0/d2/d75/namespacecv.html.
    [72]
    Linux Kernel Organization. Seccomp BPF (SECure COMPuting with filters). https://www.kernel.org/doc/html/v5.0/userspace-api/seccomp_filter.html.
    [73]
    The pandas development team. pandas-dev/pandas: Pandas, February 2020.
    [74]
    Nicolas Papernot, Patrick D. McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, and Ananthram Swami. The limitations of deep learning in adversarial settings. 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pages 372--387, 2016.
    [75]
    Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, and David Wagner. Addroid: Privilege separation for applications and advertisers in android. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pages 71--72, 2012.
    [76]
    PyTorch. PyTorch. https://pytorch.org/.
    [77]
    PyTorch. Training a Classifier. https://pytorch.org/tutorials/beginner/blitz/cifar10_tutorial.html.
    [78]
    Suriyadeepan Ramamoorthy. torchtest. https://github.com/suriyadeepan/torchtest, 2019.
    [79]
    Rapid7. Metasploit, 2020. https://www.metasploit.com/.
    [80]
    Vitalis Salis, Thodoris Sotiropoulos, Panos Louridas, Diomidis Spinellis, and Dimitris Mitropoulos. Pycg: Practical call graph generation in python. In 43rd International Conference on Software Engineering, ICSE '21, 2021.
    [81]
    David Schrammel, Samuel Weiser, Richard Sadek, and Stefan Mangard. Jenny: Securing syscalls for PKU-based memory isolation systems. In 31st USENIX Security Symposium (USENIX Security 22), pages 936--952, Boston, MA, August 2022. USENIX Association.
    [82]
    David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, and Daniel Gruss. Donky: Domain keys - efficient In-Process isolation for RISC-V and x86. In 29th USENIX Security Symposium (USENIX Security 20), pages 1677--1694. USENIX Association, August 2020.
    [83]
    Scikit-learn. Scikit-learn: Machine Learning in Python, 2020. https://scikit-learn.org/stable/.
    [84]
    Shreyas. OMR Checker. https://github.com/letssolvetogether/OMRChecker.
    [85]
    SolarWinds MSP. RCE: Remote Code Execution Explained, 2019. https://www.solarwindsmsp.com/blog/remote-code-execution.
    [86]
    Steve Zurier. TensorFlow revokes support for YAML because of arbitrary code execution vulnerability, 2021. https://www.scmagazine.com/analysis/devops/tensorflow-revokes-support-for-yaml-because-of-arbitrary-code-execution-vulnerability.
    [87]
    Sushant. Real-Time Facial Emotion Recognition with Convolutional Neural Nets, 2017.
    [88]
    Taehoon Kim. DCGAN Tensorflow. https://github.com/carpedm20/DCGAN-tensorflow.
    [89]
    TensorFlow. Tensorflow: An end-to-end open source machine learning platform, 2020. https://www.tensorflow.org/.
    [90]
    The LLVM Foundation. The LLVM Compiler Infrastructure Project. https://llvm.org/.
    [91]
    The Matplotlib Development team. Matplotlib - Visualization with Python, 2022. https://matplotlib.org/.
    [92]
    Trishume. A webcam based pupil tracking implementation., 2019.
    [93]
    Udayraj Deshmukh. An android application for validating images of OMR sheets before they are sent for processing, 2019. https://github.com/Udayraj123/AndroidOMRHelper.
    [94]
    Udayraj Deshmukh. Grade exams fast and accurately using a scanner or your phone, 2020. https://github.com/Udayraj123/OMRChecker.
    [95]
    Jonathan Uesato, Brendan O'Donoghue, Aäron van den Oord, and Pushmeet Kohli. Adversarial risk and the dangers of evaluating against weak attacks. In ICML, 2018.
    [96]
    Ultralytics. YOLOv3 in PyTorch. https://github.com/ultralytics/yolov3.
    [97]
    Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. ERIM: Secure, efficient in-process isolation with protection keys (MPK). In 28th USENIX Security Symposium (USENIX Security 19), pages 1221--1238, Santa Clara, CA, August 2019. USENIX Association.
    [98]
    Victor van der Veen, Dennis Andriesse, Enes Göktaş, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida. Practical context-sensitive cfi. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, page 927--940, New York, NY, USA, 2015. Association for Computing Machinery.
    [99]
    Vidita V Koushik. Uncovering critical vulnerabilities in real-time computer vision library, OpenCV, 2020. https://www.secpod.com/blog/opencv-buffer-overflow-vulnerabilities-jan-2020/.
    [100]
    Alexios Voulimeneas, Jonas Vinck, Ruben Mechelinck, and Stijn Volckaert. You shall not (by)pass! practical, secure, and fast pku-based sandboxing. In Proceedings of the Seventeenth European Conference on Computer Systems, EuroSys '22, page 266--282, New York, NY, USA, 2022. Association for Computing Machinery.
    [101]
    Robert Wahbe, Steven Lucco, Thomas E Anderson, and Susan L Graham. Efficient software-based fault isolation. In Proceedings of the fourteenth ACM symposium on Operating systems principles, pages 203--216, 1993.
    [102]
    Qiang Wang, Li Zhang, Luca Bertinetto, Weiming Hu, and Philip HS Torr. Fast online object tracking and segmentation: A unifying approach. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1328--1338, 2019.
    [103]
    Jinpeng Wei and Calton Pu. Tocttou vulnerabilities in unix-style file systems: An anatomical study. In Proceedings of the 4th Conference on USENIX Conference on File and Storage Technologies - Volume 4, FAST'05, page 12, USA, 2005. USENIX Association.
    [104]
    Mark Weiser. Program slicing. In Proceedings of the 5th International Conference on Software Engineering, ICSE '81, page 439--449. IEEE Press, 1981.
    [105]
    Yongzheng Wu, Sai Sathyanarayan, Roland HC Yap, and Zhenkai Liang. Codejail: Application-transparent isolation of libraries with tight program interactions. In European Symposium on Research in Computer Security, pages 859--876. Springer, 2012.
    [106]
    Yongzheng Wu, Jun Sun, Yang Liu, and Jin Song Dong. Automatically partition software into least privilege components using dynamic data dependency analysis. In 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), pages 323--333. IEEE, 2013.
    [107]
    Yongzheng Wu, Jun Sun, Yang Liu, and Jin Song Dong. Automatically partition software into least privilege components using dynamic data dependency analysis. In Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, ASE'13, page 323--333. IEEE Press, 2013.
    [108]
    Qi Xin, Myeongsoo Kim, Qirun Zhang, and Alessandro Orso. Subdomain-based generality-aware debloating. In Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, ASE '20, page 224--236, New York, NY, USA, 2021. Association for Computing Machinery.
    [109]
    xming521. CTAI, 2020. https://github.com/xming521/CTAI.
    [110]
    Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, and Nicholas Fullagar. Native client: A sandbox for portable, untrusted x86 native code. Commun. ACM, 53(1):91--99, January 2010.
    [111]
    Shiqi Yu. an open source library for CNN-based face detection in images., 2020.
    [112]
    Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, and Andrew C. Myers. Secure program partitioning. ACM Trans. Comput. Syst., 20(3):283--328, August 2002.
    [113]
    Weijuan Zhang, Xiaoqi Jia, Shengzhi Zhang, Rui Wang, and Peng Liu. Running os kernel in separate domains: A new architecture for applications and os services quarantine. In 2018 25th Asia-Pacific Software Engineering Conference (APSEC), pages 219--228, Dec 2018.
    [114]
    Xiangyu Zhang and Rajiv Gupta. Cost effective dynamic program slicing. In Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation, PLDI '04, page 94--106, New York, NY, USA, 2004. Association for Computing Machinery.
    [115]
    Bolei Zhou, Hang Zhao, Xavier Puig, Tete Xiao, Sanja Fidler, Adela Barriuso, and Antonio Torralba. Semantic understanding of scenes through the ade20k dataset. International Journal on Computer Vision, 2018.
    [116]
    Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A Efros. Unpaired image-to-image translation using cycle-consistent adversarial networkss. In Computer Vision (ICCV), 2017 IEEE International Conference on, 2017.

    Index Terms

    1. FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASPLOS '23: Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4
      March 2023
      430 pages
      ISBN:9798400703942
      DOI:10.1145/3623278
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 February 2024

      Check for updates

      Author Tags

      1. software isolation
      2. software partitioning
      3. data processing frameworks

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ASPLOS '23

      Acceptance Rates

      Overall Acceptance Rate 535 of 2,713 submissions, 20%

      Upcoming Conference

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 287
        Total Downloads
      • Downloads (Last 12 months)287
      • Downloads (Last 6 weeks)107

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media