Sub-Operating Systems: A New Approach to Application Security

Loading...
Thumbnail Image
Penn collection
Departmental Papers (CIS)
Degree type
Discipline
Subject
Funder
Grant number
License
Copyright date
Distributor
Related resources
Author
Ioannidis, Sotiris
Bellovin, Steven M
Contributor
Abstract

Users regularly exchange apparently innocuous data files using email and ftp. While the users view these data as passive, there are situations when they are interpreted as code by some system application. In that case the data become "active". Some examples of such data are Java, JavaScript and Microsoft Word attachments, each of which are executed within the security context of the user, allowing potentially arbitrary machine access. The structure of current operating systems and user applications makes solving this problem challenging. We propose a new protection mechanism to address active content, which applies fine-grained access controls at the level of individual data objects. All data objects arriving from remote sources are tagged with a non-removable identifier. This identifier dictates its permissions and privileges rather than the file owner’s user ID. Since users possess many objects, the system provides far more precise access control policies to be enforced, and at a far finer granularity than previous designs.

Advisor
Date of presentation
2002-09-22
Conference name
Departmental Papers (CIS)
Conference dates
2023-05-16T22:31:41.000
Conference location
Date Range for Data Collection (Start Date)
Date Range for Data Collection (End Date)
Digital Object Identifier
Series name and number
Volume number
Issue number
Publisher
Publisher DOI
Journal Issue
Comments
Presented at the 10th ACM SIGOPS European Workshop : Can we really depend on an OS?, 22-25 September 2002, Saint-Emilion, France.
Postprint version. Published in 10th SIGOPS European Workshop, September 2002. Publisher URL: http://www.diku.dk/ew2002/
Recommended citation
Collection