Abstract
Policy-based confinement, employed in SELinux and specification-based intrusion detection systems, is a popular approach for defending against exploitation of vulnerabilities in benign software. Conventional access control policies employed in these approaches are effective in detecting privilege escalation attacks. However, they are unable to detect attacks that “hijack” legitimate access privileges granted to a program, e.g., an attack that subverts an FTP server to download the password file. (Note that an FTP server would normally need to access the password file for performing user authentication.) Some of the common attack types reported today, such as SQL injection and cross-site scripting, involve such subversion of legitimate access privileges. In this paper, we present a new approach to strengthen policy enforcement by augmenting security policies with information about the trustworthiness of data used in security-sensitive operations. We evaluated this technique using 9 available exploits involving several popular software packages containing the above types of vulnerabilities. Our technique sucessfully defeated these exploits.
| Original language | English |
|---|---|
| Pages | 121-136 |
| Number of pages | 16 |
| State | Published - 2006 |
| Event | 15th USENIX Security Symposium - Vancouver, Canada Duration: Jul 31 2006 → Aug 4 2006 |
Conference
| Conference | 15th USENIX Security Symposium |
|---|---|
| Country/Territory | Canada |
| City | Vancouver |
| Period | 07/31/06 → 08/4/06 |
Fingerprint
Dive into the research topics of 'Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver