首页> 外文学位 >Protecting server programs and systems: Privilege separation, attack surface reduction, and risk assessment.
【24h】

Protecting server programs and systems: Privilege separation, attack surface reduction, and risk assessment.

机译:保护服务器程序和系统:特权分离,减少攻击面和风险评估。

获取原文
获取原文并翻译 | 示例

摘要

In today's digitized world, server programs and systems have become an indispensable part of people's daily life and business, such as Web service, file service, database, etc. In the meanwhile, server programs and systems have been attracting more and more attacks and threats, resulting in the reality that they are constantly being targeted and compromised. Besides, the associated impact is becoming larger and larger, ranging from millions of stolen credit card numbers to innumerous Web servers vulnerable and waiting for an emergency security patch.;In this dissertation, we perform a three-dimensional research study emphasizing on protecting server programs and systems, including privilege separation, attack surface reduction, and risk assessment.;First, we explore applying privilege separation to enhance the security of server programs. We design and implement Arbiter, a runtime system targeting at fine-grained privilege separation in multithreaded server programs. In Arbiter, different principal threads can have different privileges to access shared data objects so that the compromise or malfunction of one thread does not lead to data contamination or data leakage of another thread. We leverage page table protection bits and devise a new memory allocation mechanism to achieve efficient reference monitoring. Programmers specify security policy through annotating the source code.;Second, reducing attack surface is an effective preventive measure to strengthen security in large-scale server systems. We propose an automated approach to accurately detect the idling (most likely unused) services and provide ways to reduce their attack surface. We implement this idea and deploy our system in a real working environment of a mid-sized enterprise to identify and constrain unused services that expose attack surface.;Finally, given a server program or system, it is important to evaluate the effectiveness of different security settings and understand the security risks of potential vulnerabilities. We study an emergent type of vulnerability, namely buffer over-read vulnerability, and propose a systematic methodology to model buffer over-read vulnerabilities and quantitatively measure the potential amount of information leakage.
机译:在当今的数字化世界中,服务器程序和系统已成为人们日常生活和业务中不可或缺的一部分,例如Web服务,文件服务,数据库等。与此同时,服务器程序和系统已吸引了越来越多的攻击和威胁。 ,导致他们不断遭到针对性和破坏。此外,相关的影响也越来越大,从数百万的信用卡号被盗到无数的Web服务器易受攻击并等待紧急安全补丁。本论文中,我们进行了一个三维研究,着重于保护服务器程序。首先,我们探索应用权限分离来增强服务器程序的安全性。我们设计并实现Arbiter,这是一个针对多线程服务器程序中的细粒度特权分离的运行时系统。在Arbiter中,不同的主线程可以具有访问共享数据对象的不同特权,因此一个线程的危害或故障不会导致另一线程的数据污染或数据泄漏。我们利用页表保护位并设计一种新的内存分配机制来实现有效的参考监视。程序员通过注释源代码来指定安全策略。其次,减少攻击面是增强大型服务器系统安全性的有效预防措施。我们提出一种自动方法来准确检测闲置(最有可能未使用)的服务,并提供减少攻击面的方法。我们实现了这个想法,并在中型企业的实际工作环境中部署了系统,以识别和限制暴露攻击面的未使用服务。最后,对于服务器程序或系统,评估不同安全性的有效性非常重要。设置并了解潜在漏洞的安全风险。我们研究了一种新兴的漏洞类型,即缓冲区过度读取漏洞,并提出了一种系统化的方法来对缓冲区过度读取漏洞进行建模并定量测量潜在的信息泄漏量。

著录项

  • 作者

    Wang, Jun.;

  • 作者单位

    The Pennsylvania State University.;

  • 授予单位 The Pennsylvania State University.;
  • 学科 Computer science.;Information science.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 145 p.
  • 总页数 145
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号