Affiliation:
1. Stanford University, Stanford, CA
Abstract
High-level semantic vulnerabilities such as SQL injection and crosssite scripting have surpassed buffer overflows as the most prevalent security exploits. The breadth and diversity of software vulnerabilities demand new security solutions that combine the speed and practicality of hardware approaches with the flexibility and robustness of software systems.
This paper proposes Raksha, an architecture for software security based on dynamic information flow tracking (DIFT). Raksha provides three novel features that allow for a flexible hardware/software approach to security. First, it supports flexible and programmable security policies that enable software to direct hardware analysis towards a wide range of high-level and low-level attacks. Second, it supports multiple active security policies that can protect the system against concurrent attacks. Third, it supports low-overhead security handlers that allow software to correct, complement, or extend the hardware-based analysis without the overhead associated with operating system traps.
We present an FPGA prototype for Raksha that provides a full featured Linux workstation for security analysis. Using unmodified binaries for real-world applications, we demonstrate that Raksha can detect high-level attacks such as directory traversal, command injection, SQL injection, and cross-site scripting as well as low-level attacks such as buffer overflows. We also show that low overhead exception handling is critical for analyses such as memory corruption protection in order to address false positives that occur due to the diverse code patterns in frequently used software.
Publisher
Association for Computing Machinery (ACM)
Reference28 articles.
1. CERT Coordination Center. Overview of attack trends. http://www.cert.org/archive/pdf/attack_trends.pdf 2002. CERT Coordination Center. Overview of attack trends. http://www.cert.org/archive/pdf/attack_trends.pdf 2002.
2. Defeating Memory Corruption Attacks via Pointer Taintedness Detection
3. Vigilante
Cited by
97 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Formalization and Analysis of Aeolus-based File System from Process Algebra Perspective;Mobile Networks and Applications;2024-09-13
2. sIOPMP: Scalable and Efficient I/O Protection for TEEs;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2;2024-04-27
3. The area-efficient gate level information flow tracking schemes of digital circuit with multi-level security lattice;Microelectronics Journal;2024-02
4. Verification;Formal and Practical Techniques for the Complex System Design Process using Virtual Prototypes;2024
5. Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V;Cryptography;2023-11-16