Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243745
|View full text |Cite
|
Sign up to set email alerts
|

When Good Components Go Bad

Abstract: We propose a new formal criterion for evaluating secure compilation schemes for unsafe languages, expressing end-to-end security guarantees for software components that may become compromised after encountering undefined behavior-for example, by accessing an array out of bounds. Our criterion is the first to model dynamic compromise in a system of mutually distrustful components with clearly specified privileges. It articulates how each component should be protected from all the others-in particular, from comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 75 publications
0
5
0
Order By: Relevance
“…A compiler from the high-level to the low-level might be insecure as it exposes source-level programs to illicit control flow. This is another important and well-documented example of failure of full abstraction [8,37,3,33].…”
Section: Control Flowmentioning
confidence: 96%
“…A compiler from the high-level to the low-level might be insecure as it exposes source-level programs to illicit control flow. This is another important and well-documented example of failure of full abstraction [8,37,3,33].…”
Section: Control Flowmentioning
confidence: 96%
“…Formalization Prior work has developed formal frameworks for stating and proving strong isolation properties in the context of new languages or subsets of existing lan-guages [1,18,20,37,38]. MIR takes a different approach, working with an existing language and offering a quantification of privilege reduction rather than an all-or-nothing property.…”
Section: Related Workmentioning
confidence: 99%
“…Modern software development relies heavily on third-party libraries. 1 Such reliance has led to an explosion of attacks [14,29,33,34,56,68]: overprivileged code in imported libraries provides an attack vector that is exploitable long after libraries reach their end-users. Even when libraries are created and authored with the best possible intentions-i.e., are not actively malicious-their privilege can be exploited at runtime to compromise the entire application-or worse, the broader system on which the application is executing.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There is existing work on formal, high-level properties of compartmentalization in the context of compilation. Juglaret et al [2016] and Abate et al [2018] investigate how a compiler can transfer properties of a compartmentalized source language application to the target language. While this work also relies on the notion of robust properties (at least superficially), it is actually complementary.…”
Section: Related Workmentioning
confidence: 99%