Loading...
Please wait, while we are loading the content...
Similar Documents
Byte Bouncer : Efficient Enforcement of Least Privilege Using Certified Binaries
| Content Provider | Semantic Scholar |
|---|---|
| Author | Chakrabarti, Arindam Chang, Bor-Yuh Evan Chlipala, Adam |
| Abstract | Almost all computer users today are aware that malicious code, such as viruses and worms, can cause a great amount of damage. Nonetheless, most software is still distributed as binary executables with basically no certification of their safety, nor do users use sufficient safeguards when executing such untrusted code. We assert that while end users know the security properties they would like upheld, most existing systems do not provide a method by which those precise properties can be specified. In this paper, we attempt to address this problem with an instantiation of Proof-Carrying Code for high-level security policies. We give a policy description language that can be used to describe security policies of interest to the end user in terms of logical preand post-conditions on system calls, as well as an enforcement mechanism to ensure conformance to the policy. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://adam.chlipala.net/berkeley/classes/261/bytebouncer.pdf |
| Alternate Webpage(s) | http://www.cs.berkeley.edu/~adamc/berkeley/classes/261/bytebouncer.pdf |
| Alternate Webpage(s) | http://www.cs.berkeley.edu/~adamc/classes/261/bytebouncer.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |