The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382215
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging "choice" to automate authorization hook placement

Abstract: When servers manage resources on behalf of multiple, mutuallydistrusting clients, they must mediate access to those resources to ensure that each client request complies with an authorization policy. This goal is typically achieved by placing authorization hooks at appropriate locations in server code. The goal of authorization hook placement is to completely mediate all security-sensitive operations on shared resources.To date, authorization hook placement in code bases, such as the X server and postgresql, h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 16 publications
(24 citation statements)
references
References 24 publications
0
24
0
Order By: Relevance
“…However, over time the amount of information that programmers must specify has been reduced. In our prior work, we infer security-sensitive operations only using the sources of untrusted inputs and languagespecific lookup functions [13].…”
Section: Background On Hook Placementmentioning
confidence: 99%
See 3 more Smart Citations
“…However, over time the amount of information that programmers must specify has been reduced. In our prior work, we infer security-sensitive operations only using the sources of untrusted inputs and languagespecific lookup functions [13].…”
Section: Background On Hook Placementmentioning
confidence: 99%
“…Second, such placements might lead to redundant authorization, as one hook may already perform the same authorization as another hook that it dominates. In our prior work, we have suggested techniques to remove hooks that authorize structure member accesses redundantly [13]. However, this approach still does not result in a placement that has a one-to-one correspondence with hooks placed manually by domain experts.…”
Section: Background On Hook Placementmentioning
confidence: 99%
See 2 more Smart Citations
“…Static taint analysis does not incur runtime overhead, but may report false errors. It has been used for identifying vulnerabilities [50,51,52,53,54], for helping symbolic execution [55], and for identifying where authorization hooks should be placed in an access-control system [56].…”
Section: Related Workmentioning
confidence: 99%