Skip to main navigation Skip to search Skip to main content

Role Models: Role-based Debloating for Web Applications

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The process of debloating, i.e., removing unnecessary code and features in software, has become an attractive proposition to managing the ever-expanding attack surface of ever-growing modern applications. Researchers have shown that debloating produces significant security improvements in a variety of application domains including operating systems, libraries, compiled software, and, more recently, web applications. Even though the client/server nature of web applications allows the same backend to serve thousands of users with diverse needs, web applications have been approached monolithically by existing debloating approaches. That is, a feature can be debloated only if none of the users of a web application requires it. Similarly, everyone gets access to the same "global"features, whether they need them or not. Recognizing that different users need access to different features, in this paper we propose role-based debloating for web applications. In this approach, we focus on clustering users with similar usage behavior together and providing them with a custom debloated application that is tailored to their needs. Through a user study with 60 experienced web developers and administrators, we first establish that different users indeed use web applications differently. This data is then used by DBLTR, an automated pipeline for providing tailored debloating based on a user's true requirements. Next to debloating web applications, DBLTR includes a transparent content-delivery mechanism that routes authenticated users to their debloated copies. We demonstrate that for different web applications, DBLTR can be 30-80% more effective than the state-of-the-art in debloating in removing critical vulnerabilities.

Original languageEnglish
Title of host publicationCODASPY 2023 - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy
PublisherAssociation for Computing Machinery, Inc
Pages251-262
Number of pages12
ISBN (Electronic)9798400700675
DOIs
StatePublished - Apr 24 2023
Event13th ACM Conference on Data and Application Security and Privacy, CODASPY 2023 - Charlotte, United States
Duration: Apr 24 2023Apr 26 2023

Publication series

NameCODASPY 2023 - Proceedings of the 13th ACM Conference on Data and Application Security and Privacy

Conference

Conference13th ACM Conference on Data and Application Security and Privacy, CODASPY 2023
Country/TerritoryUnited States
CityCharlotte
Period04/24/2304/26/23

Keywords

  • attack surface reduction
  • software debloating
  • web applications

Fingerprint

Dive into the research topics of 'Role Models: Role-based Debloating for Web Applications'. Together they form a unique fingerprint.

Cite this