Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2613087.2613110acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Towards more usable information flow policies for contemporary operating systems

Published: 25 June 2014 Publication History

Abstract

There has been a resurgence of interest in information flow based techniques in security. A key attraction of these techniques is that they can provide strong, principled protection against malware, regardless of its sophistication. In spite of this advantage, most advances in information flow control have not been adopted in mainstream operating systems since a strict application of information flow can limit system functionality and usability. Permitting dynamic changes to subject labels, as proposed in the low-watermark model, provides better usability. However, it suffers from the self-revocation problem, whereby read/write operations on already open files are denied because the label of the subject performing these operations has been downgraded. While most applications deal gracefully with security failures on file open operations, they are unprepared to handle security violations on subsequent reads/writes. As a result, subject downgrades may lead to crashes or malfunction. Even those applications that deal with read/write errors may still leave output files in a corrupted or inconsistent state since write permissions were taken away in the midst of producing an output file. To overcome these drawbacks, we propose a new approach for dynamic downgrading that eliminates the self-revocation problem. We show that our approach represents an optimal combination of functionality and compatibility. Our experimental evaluation shows that our approach is efficient, incurring an overhead of a few percentage points, is compatible with existing applications, and provides strong integrity protection.

References

[1]
Akari, http://akari.sourceforge.jp/.
[2]
Operation Aurora, http://en.wikipedia.org/wiki/Operation_Aurora.
[3]
Packet Storm, http://packetstormsecurity.com.
[4]
K. J. Biba. Integrity Considerations for Secure Computer Systems. In Technical Report ESD-TR-76--372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts, 1977.
[5]
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor. SubDomain: Parsimonious Server Security. In LISA, 2000.
[6]
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and Event Processes in the Asbestos Operating System. In SOSP, 2005.
[7]
N. Falliere, L. Murchu, and E. Chien. W32. Stuxnet Dossier. White paper, Symantec Corp., Security Response, 2011.
[8]
T. Fraser. LOMAC: Low Water-Mark Integrity Protection for COTS Environments. In S&P, 2000.
[9]
T. Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. In NDSS, 2003.
[10]
T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A Delegating Architecture for Secure System Call Interposition. In NDSS, 2004.
[11]
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker). In USENIX Security, 1996.
[12]
K. Jain and R. Sekar. User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. In NDSS, 2000.
[13]
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information Flow Control for Standard OS Abstractions. In SOSP, 2007.
[14]
N. Li, Z. Mao, and H. Chen. Usable Mandatory Integrity Protection for Operating Systems . In S&P, 2007.
[15]
Z. Liang, W. Sun, V. N. Venkatakrishnan, and R. Sekar. Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. In TISSEC 12(3), 2009.
[16]
J. Ligatti, L. Bauer, and D. Walker. Edit Automata: Enforcement Mechanisms for Run-Time Security Policies. International Journal of Information Security, 4(1--2):2--16, 2005.
[17]
P. Loscocco and S. Smalley. Meeting Critical Security Objectives with Security-Enhanced Linux. In Ottawa Linux symposium, 2001.
[18]
Z. Mao, N. Li, H. Chen, and X. Jiang. Combining Discretionary Policy with Mandatory Information Flow in Operating Systems. In TISSEC 14(3), 2011.
[19]
C. Parampalli, R. Sekar, and R. Johnson. A Practical Mimicry Attack Against Powerful System-Call Monitors. In ASIACCS, 2008.
[20]
S. Potter and J. Nieh. Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems. In USENIX conference on USENIX annual technical conference, 2010.
[21]
N. Provos. Improving Host Security with System Call Policies. In USENIX Security, 2003.
[22]
F. B. Schneider. Enforceable Security Policies. In TISSEC 3(1), 2000.
[23]
R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. DuVarney. Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications. In SOSP, 2003.
[24]
W. Sun, Z. Liang, V. N. Venkatakrishnan, and R. Sekar. One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments. In NDSS, 2005.
[25]
W. Sun, R. Sekar, Z. Liang, and V. N. Venkatakrishnan. Expanding Malware Defense by Securing Software Installations. In DIMVA, 2008.
[26]
W. Sun, R. Sekar, G. Poothia, and T. Karandikar. Practical Proactive Integrity Preservation: A Basis for Malware Defense. In S&P, 2008.
[27]
W. K. Sze and B. Mital. Self-Revocation Free Downgrading (SRFD). http://www.seclab.cs.sunysb.edu/seclab/srfd.
[28]
W. K. Sze and R. Sekar. A Portable User-Level Approach for System-wide Integrity Protection. In ACSAC, 2013.
[29]
TrendLabs APT Research Team. Spear-Phishing Email: Most Favored APT Attack Bait. 2012.
[30]
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making Information Flow Explicit in HiStar. In OSDI, 2006.

Cited By

View all
  • (2018)Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack PathsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.282109513:10(2506-2521)Online publication date: Oct-2018
  • (2017)Preventing Unauthorized Data FlowsData and Applications Security and Privacy XXXI10.1007/978-3-319-61176-1_3(41-62)Online publication date: 22-Jun-2017
  • (2015)Provenance-based Integrity Protection for WindowsProceedings of the 31st Annual Computer Security Applications Conference10.1145/2818000.2818011(211-220)Online publication date: 7-Dec-2015

Index Terms

  1. Towards more usable information flow policies for contemporary operating systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SACMAT '14: Proceedings of the 19th ACM symposium on Access control models and technologies
      June 2014
      234 pages
      ISBN:9781450329392
      DOI:10.1145/2613087
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 June 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. integrity
      2. self-revocation
      3. usability

      Qualifiers

      • Research-article

      Conference

      SACMAT '14
      Sponsor:

      Acceptance Rates

      SACMAT '14 Paper Acceptance Rate 17 of 58 submissions, 29%;
      Overall Acceptance Rate 177 of 597 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 30 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack PathsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.282109513:10(2506-2521)Online publication date: Oct-2018
      • (2017)Preventing Unauthorized Data FlowsData and Applications Security and Privacy XXXI10.1007/978-3-319-61176-1_3(41-62)Online publication date: 22-Jun-2017
      • (2015)Provenance-based Integrity Protection for WindowsProceedings of the 31st Annual Computer Security Applications Conference10.1145/2818000.2818011(211-220)Online publication date: 7-Dec-2015

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media