...
首页> 外文期刊>IEEE Transactions on Parallel and Distributed Systems >Utilizing Binary Rewriting for Improving End-Host Security
【24h】

Utilizing Binary Rewriting for Improving End-Host Security

机译:利用二进制重写来提高最终主机的安全性

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Conventional methods supporting Java binary security mainly rely on the security of the hosts Java Virtual Machine (JVM). However, malicious Java binaries keep exploiting the vulnerabilities of JVMs, escaping their sandbox restrictions and allowing attacks on end user systems. Administrators must confront the difficulties and dilemmas brought on by security upgrades. On the other hand, binary rewriting techniques have been advanced to allow users to enforce security policies directly on mobile code. They have the advantage of supporting a richer set of security policies and self-constrained written code. However, the high administrative and performance overhead caused by security configuration and code rewriting have prevented rewriters from becoming a practical security tool.In this paper, we address these problems by integrating binary code rewriters with web caching proxies and build the security system called PB-JARS, a Proxy-based JAva Rewriting System. PB-JARS works as a complimentary system to existing JVM security mechanisms by placing another line of defense between users and their end user systems. It gives system administrators centralized security control and management for mobile code and security policies. We evaluated PB-JARS using a real Java binary traffic model derived from analyzing real web trace records. Our results show that adding binary rewriting to web caching system can be very efficient in improving end host security at low cost.
机译:支持Java二进制安全性的常规方法主要依赖于主机Java虚拟机(JVM)的安全性。但是,恶意Java二进制文件继续利用JVM的漏洞,逃避了其沙箱限制,并允许对最终用户系统的攻击。管理员必须面对安全升级带来的困难和困境。另一方面,二进制重写技术已得到改进,以允许用户直接在移动代码上实施安全策略。它们的优势是支持更丰富的安全策略集和自我约束的书面代码。但是,由于安全配置和代码重写导致的高管理和性能开销,使重写器无法成为实用的安全工具。在本文中,我们通过将二进制代码重写器与Web缓存代理集成来解决这些问题,并构建了称为PB-的安全系统。 JARS,基于代理的JAva重写系统。 PB-JARS通过在用户及其最终用户系统之间放置另一道防线,作为现有JVM安全机制的补充系统。它为系统管理员提供了针对移动代码和安全策略的集中式安全控制和管理。我们使用通过分析真实的Web跟踪记录得出的真实Java二进制流量模型来评估PB-JARS。我们的结果表明,将二进制重写添加到Web缓存系统可以非常有效地以低成本提高最终主机的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号