Security in Untrusted Code Environments: Missing Pieces of the Puzzle
نویسنده
چکیده
Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies, component-based security architectures such as Java and .NET still fail to provide several essential features such as restricted delegation of authority, separation of access control from functionality (Java only) and more flexible security policies. We examine the stack inspection mechanism central to policy enforcement on end systems running Java 2 and the .NET Common Language Runtime. Here we reveal that the mechanism has a number of undesirable implications for developers of code components, and may lead to behavior entirely unexpected to users of mobile code. In the context of the evolving web-based computing environment we discuss a set of open challenges before mobile code security architectures, and suggest approaches to address the emerging needs.
منابع مشابه
Cultural and Social Enigmas: Missing Pieces of Food Security
The growing attention in food security has suggested many approaches to develop a society free from hunger and malnutrition. Methodological approaches are mostly used to overcome the challenges of food security, but food insecurity is more than mere availability and access to food. Cultural and social dimensions and their intricacies to achieve food security are mostly missing from the lite...
متن کاملBOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
In the past decade, we have come to rely on computers for various safety and security-critical tasks, such as securing our homes, operating our vehicles, and controlling our finances. To facilitate these tasks, chip manufacturers have begun including trusted execution environments (TEEs) in their processors, which enable critical code (e.g., cryptographic functions) to run in an isolated hardwa...
متن کاملSecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
Protecting commodity desktop systems that run commercial operating systems (OS) without adversely impacting performance or usability remains an open problem. To make matters worse, the overall system security depends on desktop applications with complex code-bases that performmultiple and inter-dependent tasks often dictated by Internet-borne code. Recent research has indicated the need for con...
متن کاملExtending Tamper-Proof Hardware Security to Untrusted Execution Environments
This paper addresses mobile code protection with respect to potential integrity and confidentiality violations originating from the untrusted runtime environment where the code execution takes place. Both security properties are defined in a framework where code is modeled using Boolean circuits. Two protection schemes are presented. The first scheme addresses the protection of a function that ...
متن کاملLanguage Issues in Mobile Program Security
Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspect of any mobile code technology, it is often treated after the fundamental design is complete, in ad hoc ways. In the end, it is unclear what security guarantees can be made for the system. We argue that mobile programming lang...
متن کامل