Skip to main navigation Skip to search Skip to main content

Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks

Research output: Contribution to conferencePaperpeer-review

246 Scopus citations

Abstract

Policy-based confinement, employed in SELinux and specification-based intrusion detection systems, is a popular approach for defending against exploitation of vulnerabilities in benign software. Conventional access control policies employed in these approaches are effective in detecting privilege escalation attacks. However, they are unable to detect attacks that “hijack” legitimate access privileges granted to a program, e.g., an attack that subverts an FTP server to download the password file. (Note that an FTP server would normally need to access the password file for performing user authentication.) Some of the common attack types reported today, such as SQL injection and cross-site scripting, involve such subversion of legitimate access privileges. In this paper, we present a new approach to strengthen policy enforcement by augmenting security policies with information about the trustworthiness of data used in security-sensitive operations. We evaluated this technique using 9 available exploits involving several popular software packages containing the above types of vulnerabilities. Our technique sucessfully defeated these exploits.

Original languageEnglish
Pages121-136
Number of pages16
StatePublished - 2006
Event15th USENIX Security Symposium - Vancouver, Canada
Duration: Jul 31 2006Aug 4 2006

Conference

Conference15th USENIX Security Symposium
Country/TerritoryCanada
CityVancouver
Period07/31/0608/4/06

Fingerprint

Dive into the research topics of 'Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks'. Together they form a unique fingerprint.

Cite this