Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3139324.3139327acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
invited-talk

Data-driven Software Security and its Hardware Support

Published: 03 November 2017 Publication History

Abstract

For computer software, our security models, policies, mechanisms, and means of assurance were primarily conceived and developed before the end of the 1970's. However, since that time, software has changed radically: it is thousands of times larger, comprises countless libraries, layers, and services, and is used for more purposes, in far more complex ways. As a consequence, it is necessary to revisit many of our core computer security concepts. For example, it is unclear how the Principle of Least Privilege can be applied to set security policy, when software is too complex for either its developers or its users to explain its intended behavior in detail.
One possibility is to take an empirical, data-driven approach to modern software, and determine its exact, concrete behavior via comprehensive, online monitoring. Such an approach can be a practical, effective basis for security--as demonstrated by its success in spam and abuse fighting--but its use to constrain software behavior raises many questions. In particular, two questions seem critical. First, is it possible to learn the details of how software *is* behaving, without intruding on the privacy of its users' Second, are those details a good foundation for deriving security policies that constrain how software *should* behave? This talk answers both these questions in the affirmative, as part of an overall approach to data-driven security. It also considers what hardware support is necessary to perform comprehensive software monitoring, with privacy, and without prohibitive overhead.

Index Terms

  1. Data-driven Software Security and its Hardware Support

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASHES '17: Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security
    November 2017
    68 pages
    ISBN:9781450353977
    DOI:10.1145/3139324
    • Program Chairs:
    • Chip Hong Chang,
    • Ulrich Rührmair,
    • Publications Chair:
    • Wei Zhang
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 November 2017

    Check for updates

    Author Tags

    1. computer security
    2. data-driven security
    3. hardware security
    4. hardware-assisted software monitoring

    Qualifiers

    • Invited-talk

    Conference

    CCS '17
    Sponsor:

    Acceptance Rates

    ASHES '17 Paper Acceptance Rate 6 of 20 submissions, 30%;
    Overall Acceptance Rate 6 of 20 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 115
      Total Downloads
    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 17 Oct 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media