There are no files associated with this item.
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.citation.conferencePlace | US | - |
dc.citation.endPage | 220 | - |
dc.citation.startPage | 209 | - |
dc.citation.title | ACM Conference on Data and Application Security and Privacy | - |
dc.contributor.author | Jeon, Yuseok | - |
dc.contributor.author | Rhee, J. | - |
dc.contributor.author | Kim, C.H. | - |
dc.contributor.author | Li, Z. | - |
dc.contributor.author | Payer, M. | - |
dc.contributor.author | Lee, B. | - |
dc.contributor.author | Wu, Z. | - |
dc.date.accessioned | 2024-02-01T00:37:39Z | - |
dc.date.available | 2024-02-01T00:37:39Z | - |
dc.date.created | 2020-12-01 | - |
dc.date.issued | 2019-03-25 | - |
dc.description.abstract | setuid system calls enable critical functions such as user authentications and modular privileged components. Such operations must only be executed after careful validation. However, current systems do not perform rigorous checks, allowing exploitation of privileges through memory corruption vulnerabilities in privileged programs. As a solution, understanding which setuid system calls can be invoked in what context of a process allows precise enforcement of least privileges. We propose a novel comprehensive method to systematically extract and enforce least privilege of setuid system calls to prevent misuse. Our approach learns the required process contexts of setuid system calls along multiple dimensions: process hierarchy, call stack, and parameter in a process-aware way. Every setuid system call is then restricted to the per-process context by our kernel-level context enforcer. Previous approaches without process-awareness are too coarse-grained to control setuid system calls, resulting in over-privilege. Our method reduces available privileges even for identical code depending on whether it is run by a parent or a child process. We present our prototype called PoLPer which systematically discovers only required setuid system calls and effectively prevents real-world exploits targeting vulnerabilities of the setuid family of system calls in popular desktop and server software at near zero overhead. © 2019 Copyright held by the owner/author(s). | - |
dc.identifier.bibliographicCitation | ACM Conference on Data and Application Security and Privacy, pp.209 - 220 | - |
dc.identifier.doi | 10.1145/3292006.3300028 | - |
dc.identifier.scopusid | 2-s2.0-85063868637 | - |
dc.identifier.uri | https://scholarworks.unist.ac.kr/handle/201301/80075 | - |
dc.language | 영어 | - |
dc.publisher | Association for Computing Machinery, Inc | - |
dc.title | Polper: Process-aware restriction of over-privileged setuid calls in legacy applications | - |
dc.type | Conference Paper | - |
dc.date.conferenceDate | 2019-03-25 | - |
Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Tel : 052-217-1404 / Email : scholarworks@unist.ac.kr
Copyright (c) 2023 by UNIST LIBRARY. All rights reserved.
ScholarWorks@UNIST was established as an OAK Project for the National Library of Korea.