Tainted secure multi-execution to restrict attacker influence

Show simple item record

dc.contributor.author McCall, McKenna
dc.contributor.author Bichhawat, Abhishek
dc.contributor.author Jia, Limin
dc.contributor.other ACM SIGSAC Conference on Computer and Communications Security (CCS 2023)
dc.coverage.spatial Denmark
dc.date.accessioned 2023-12-28T16:49:21Z
dc.date.available 2023-12-28T16:49:21Z
dc.date.issued 2023-11-26
dc.identifier.citation McCall, McKenna; Bichhawat, Abhishek and Jia, Limin, "Tainted secure multi-execution to restrict attacker influence", in the ACM SIGSAC Conference on Computer and Communications Security (CCS 2023), Copenhagen, DK, Nov. 26-30, 2023.
dc.identifier.uri https://doi.org/10.1145/3576915.3623110
dc.identifier.uri https://repository.iitgn.ac.in/handle/123456789/9611
dc.description.abstract Attackers can steal sensitive user information from web pages via third-party scripts. Prior work shows that secure multi-execution (SME) with declassification is useful for mitigating such attacks, but that attackers can leverage dynamic web features to declassify more than intended. The proposed solution of disallowing events from dynamic web elements to be declassified is too restrictive to be practical; websites that declassify events from dynamic elements cannot function correctly. In this paper, we present SMT(T), a new information flow monitor based on SME which uses taint tracking within each execution to remember what has been influenced by an attacker. The resulting monitor is more permissive than what was proposed by prior work and satisfies both knowledge- and influence-based definitions of security for confidentiality and integrity policies (respectively). We also show that robust declassification follows from our influence-based security condition, for free. Finally, we examine the performance impact of monitoring attacker influence with SME by implementing SMT(T) on top of Featherweight Firefox.
dc.description.statementofresponsibility by McKenna McCall, Abhishek Bichhawat and Limin Jia
dc.language.iso en_US
dc.publisher Association for Computing Machinery (ACM)
dc.subject Information flow
dc.subject Knowledge-based non interference
dc.subject Robust declassification
dc.subject Secure multi-execution
dc.subject Taint tracking
dc.title Tainted secure multi-execution to restrict attacker influence
dc.type Conference Paper


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account