Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy 2019
DOI: 10.1145/3292006.3300028
|View full text |Cite
|
Sign up to set email alerts
|

PoLPer

Abstract: setuid system calls enable critical functions such as user authentications and modular privileged components. Such operations must only be executed after careful validation. However, current systems do not perform rigorous checks, allowing exploitation of privileges through memory corruption vulnerabilities in privileged programs. As a solution, understanding which setuid system calls can be invoked in what context of a process allows precise enforcement of least privileges. We propose a novel comprehensive me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…3) Comparison with existing stateful solutions: In this experiment, we compare Phoenix with existing solutions that can also perform stateful inspection of system calls [21], [34], [57] (these are re-implemented as no working code is publicly available). Specifically, VtPath [21] and Mutz et al [57] both leverage the call stack between pairs of consecutive system calls (namely, virtual paths) to learn the normal behavior and detect anomalous calls, while the latter also considers system calls arguments.…”
Section: Table Ii: Comparison Of False Positive Rates Between Setbase...mentioning
confidence: 99%
See 4 more Smart Citations
“…3) Comparison with existing stateful solutions: In this experiment, we compare Phoenix with existing solutions that can also perform stateful inspection of system calls [21], [34], [57] (these are re-implemented as no working code is publicly available). Specifically, VtPath [21] and Mutz et al [57] both leverage the call stack between pairs of consecutive system calls (namely, virtual paths) to learn the normal behavior and detect anomalous calls, while the latter also considers system calls arguments.…”
Section: Table Ii: Comparison Of False Positive Rates Between Setbase...mentioning
confidence: 99%
“…Specifically, VtPath [21] and Mutz et al [57] both leverage the call stack between pairs of consecutive system calls (namely, virtual paths) to learn the normal behavior and detect anomalous calls, while the latter also considers system calls arguments. PoLPer [34] blocks anomalous system calls in the setuid family by learning the calling process hierarchy, call context, and its arguments. For a fair comparison, we evaluate them both for a purpose similar to Phoenix, i.e., blocking a particular vulnerability (blacklisting), and for their intended usage, i.e., anomaly detection (whitelisting).…”
Section: Table Ii: Comparison Of False Positive Rates Between Setbase...mentioning
confidence: 99%
See 3 more Smart Citations