Security in Untrusted Code Environments: Missing Pieces of the Puzzle

نویسنده

  • Valentin Razmov
چکیده

Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies, component-based security architectures such as Java and .NET still fail to provide several essential features such as restricted delegation of authority, separation of access control from functionality (Java only) and more flexible security policies. We examine the stack inspection mechanism central to policy enforcement on end systems running Java 2 and the .NET Common Language Runtime. Here we reveal that the mechanism has a number of undesirable implications for developers of code components, and may lead to behavior entirely unexpected to users of mobile code. In the context of the evolving web-based computing environment we discuss a set of open challenges before mobile code security architectures, and suggest approaches to address the emerging needs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cultural and Social Enigmas: Missing Pieces of Food Security

   The growing attention in food security has suggested many approaches to develop a society free from hunger and malnutrition. Methodological approaches are mostly used to overcome the challenges of food security, but food insecurity is more than mere availability and access to food. Cultural and social dimensions and their intricacies to achieve food security are mostly missing from the lite...

متن کامل

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments

In the past decade, we have come to rely on computers for various safety and security-critical tasks, such as securing our homes, operating our vehicles, and controlling our finances. To facilitate these tasks, chip manufacturers have begun including trusted execution environments (TEEs) in their processors, which enable critical code (e.g., cryptographic functions) to run in an isolated hardwa...

متن کامل

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes

Protecting commodity desktop systems that run commercial operating systems (OS) without adversely impacting performance or usability remains an open problem. To make matters worse, the overall system security depends on desktop applications with complex code-bases that performmultiple and inter-dependent tasks often dictated by Internet-borne code. Recent research has indicated the need for con...

متن کامل

Extending Tamper-Proof Hardware Security to Untrusted Execution Environments

This paper addresses mobile code protection with respect to potential integrity and confidentiality violations originating from the untrusted runtime environment where the code execution takes place. Both security properties are defined in a framework where code is modeled using Boolean circuits. Two protection schemes are presented. The first scheme addresses the protection of a function that ...

متن کامل

Language Issues in Mobile Program Security

Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspect of any mobile code technology, it is often treated after the fundamental design is complete, in ad hoc ways. In the end, it is unclear what security guarantees can be made for the system. We argue that mobile programming lang...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002