Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382214
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive defenses for commodity software through virtual application partitioning

Abstract: Applications can be logically separated to parts that face different types of threats, or suffer dissimilar exposure to a particular threat because of external events or innate properties of the software. Based on this observation, we propose the virtual partitioning of applications that will allow the selective and targeted application of those protection mechanisms that are most needed on each partition, or manage an application's attack surface by protecting the most exposed partition. We demonstrate the va… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
3

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 30 publications
0
8
0
3
Order By: Relevance
“…Note that although kR ∧ X requires patching the OS kernel and (re)compiling with custom GCC plugins, it supports mixed code: that is, both protected and unprotected modules. This design not only allows for incremental deployment and adoption but also facilitates selective hardening [60].…”
Section: Methodsmentioning
confidence: 99%
“…Note that although kR ∧ X requires patching the OS kernel and (re)compiling with custom GCC plugins, it supports mixed code: that is, both protected and unprotected modules. This design not only allows for incremental deployment and adoption but also facilitates selective hardening [60].…”
Section: Methodsmentioning
confidence: 99%
“…Robustness & Security: Following this direction of improving scalability and performance, another line of research is on application partitioning. Proposed approaches [28] try to dissect each application in coherent sections with each one having different security requirements. In these works, the goal is to improve the precision of security measures that mitigate the reduced attack vector that each partition might have.…”
Section: A Security Requirements and Current State In Remote Single-dementioning
confidence: 99%
“…An alternative method to using isolation to protect secrets and mitigate the exploitation of vulnerabilities is through monitoring the execution of the software. Geneiatakos et al suggest using virtual application partitioning to dynamically adapt the software defences based on the current execution partition of the application [45]. The main focus of their work is identifying authentication points and 'sensitive' data in binary applications using techniques such as instruction set randomisation and dynamic taint analysis on the different partitions of the application.…”
Section: Related Workmentioning
confidence: 99%