Poster: User Request as a means to Automate Authorization Hook Placement

نویسندگان

  • Divya Muthukumaran
  • Trent Jaeger
  • Vinod Ganapathy
چکیده

We consider the problem of retrofitting legacy software with mechanisms for authorization policy enforcement. This is an important problem for operating systems, middleware and server applications (jointly, servers), which manage resources for and provide services to multiple, mutually-distrusting clients. Such servers must ensure that when a subject requests to perform a security-sensitive operation on an object, the operation is properly authorized. This goal is typically achieved by placing calls (termed authorization hooks) to a reference monitor [1] at suitable locations in the code of the server. At runtime, the invocation of a hook results in an authorization query that specifies the subject, object, and operation. The placement of authorization hooks must provide complete mediation of security-sensitive operations performed by the server. If this property is violated, subjects may be able to access objects even if they are not authorized to do so. In the past decade, several efforts have attempted to place authorization hooks in a variety of servers. For example, discretionary access control mechanisms deployed in the Linux kernel were found to be insufficient to protect the security of hosts in a networked world. The Linux Security Modules (LSM) framework remedies this shortcoming by placing authorization hooks to enforce more powerful security policies. Even user-space servers can benefit from similar protection. For example, the X server manages windows and other objects for multiple clients. Accesses to such objects must be mediated, void of which several attacks are possible. The X server has also therefore been retrofitted with LSM-style authorization hooks [4]. Similar efforts now abound for other server applications (e. Unfortunately, these efforts have been beset with problems. This is because the identification of security-sensitive operations and the placement of hooks is a manual procedure, largely driven by informal discussions on mailing lists in the developer community. There is no consensus on a formal definition of what constitutes a security-sensitive operation, and no tool support to identify their occurence in large code-bases. Not surprisingly, this ad hoc process has resulted in security holes, in some cases many years after hooks were deployed [8]. The discussion of which hooks to deploy can often last years, e.g., the original hook placement for the X server was proposed in 2003 [4], deployed in 2007 [9], and subsequent revisions have added additional hooks. What we therefore need is a principled way to identify security-sensitive operations and their occurrence in code, so that legacy …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Automated Authorization Policy Enforcement

In systems with shared resources, authorization policy enforcement ensures that these resources are accessible only to users who are allowed to do so. Recently, there is growing interest to (i) extend authorization policy enforcement mechanisms provided by the operating system, and (ii) enable user-space servers to enforce authorization policies on their clients. A popular mechanism for authori...

متن کامل

An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation

Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...

متن کامل

Producing Hook Placements to Enforce Expected Access Control Policies

Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control access to resources, authorization hooks are placed before operations on those resources. Moreover, manual hook placements by programmers are often incomplete or incorrect, leading to insecure programs. We advocate an approach that automatically identifies the set of program locations to plac...

متن کامل

Using CQUAL for Static Analysis of Authorization Hook Placement

The Linux Security Modules (LSM) framework is a set of authorization hooks for implementing flexible access control in the Linux kernel. While much effort has been devoted to defining the module interfaces, little attention has been paid to verifying the correctness of hook placement. This paper presents a novel approach to the verification of LSM authorization hook placement using CQUAL, a typ...

متن کامل

Smart City Reference Model: Interconnectivity for On-Demand User to Service Authentication

The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implement...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012