Automating isolation and least privilege in web services
Author(s): Blankstein, A; Freedman, Michael J.
DownloadTo refer to this page use:
http://arks.princeton.edu/ark:/88435/pr14m4k
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Blankstein, A | - |
dc.contributor.author | Freedman, Michael J. | - |
dc.date.accessioned | 2018-07-20T15:10:32Z | - |
dc.date.available | 2018-07-20T15:10:32Z | - |
dc.date.issued | 2014-11-20 | en_US |
dc.identifier.citation | Blankstein, A, Freedman, MJ. (2014). Automating isolation and least privilege in web services. 133 - 148. doi:10.1109/SP.2014.16 | en_US |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr14m4k | - |
dc.description.abstract | In many client-facing applications, a vulnerability in any part can compromise the entire application. This paper describes the design and implementation of Passe, a system that protects a data store from unintended data leaks and unauthorized writes even in the face of application compromise. Passe automatically splits (previously shared-memory-space) applications into sandboxed processes. Passe limits communication between those components and the types of accesses each component can make to shared storage, such as a backend database. In order to limit components to their least privilege, Passe uses dynamic analysis on developer-supplied end-to-end test cases to learn data and control-flow relationships between database queries and previous query results, and it then strongly enforces those relationships. Our prototype of Passe acts as a drop-in replacement for the Django web framework. By running eleven unmodified, off-the-shelf applications in Passe, we demonstrate its ability to provide strong security guarantees-Passe correctly enforced 96% of the applications' policies-with little additional overhead. Additionally, in the web-specific setting of the prototype, we also mitigate the cross-component effects of cross-site scripting (XSS) attacks by combining browser HTML5 sandboxing techniques with our automatic component separation | en_US |
dc.format.extent | 133 - 148 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | 35th IEEE Symposium on Security and Privacy, SP 2014 | en_US |
dc.rights | Final published version. This is an open access article. | en_US |
dc.title | Automating isolation and least privilege in web services | en_US |
dc.type | Conference Article | en_US |
dc.identifier.doi | doi:10.1109/SP.2014.16 | - |
dc.date.eissued | 2014 | en_US |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/conference-proceeding | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Automating isolation and least privilege in web services.pdf | 296.66 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.