Secure Extensibility for System State Extraction via Plugin Sandboxing

05/20/2019
by   Sahil Suneja, et al.
0

We introduce a new mechanism to securely extend systems data collection software with potentially untrusted third-party code. Unlike existing tools which run extension modules or plugins directly inside the monitored endpoint (the guest), we run plugins inside a specially crafted sandbox, so as to protect the guest as well as the software core. To get the right mix of accessibility and constraints required for systems data extraction, we create our sandbox by combining multiple features exported by an unmodified kernel. We have tested its applicability by successfully sandboxing plugins of an opensourced data collection software for containerized guest systems. We have also verified its security posture in terms of successful containment of several exploits, which would have otherwise directly impacted a guest, if shipped inside third-party plugins.

READ FULL TEXT

page 3

page 7

research
01/21/2020

Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX

Intel Software Guard Extensions (SGX) enables user-level code to create ...
research
02/22/2019

DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC

Today, most embedded systems use Dynamic Voltage and Frequency Scaling (...
research
03/11/2020

Opportunistic multi-party shuffling for data reporting privacy

An important feature of data collection frameworks, in which voluntary p...
research
03/21/2022

Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites

Modern websites frequently use and embed third-party services to facilit...
research
05/03/2018

An Automated Approach to Auditing Disclosure of Third-Party Data Collection in Website Privacy Policies

A dominant regulatory model for web privacy is "notice and choice". In t...
research
03/02/2022

Rpkiller: Threat Analysis from an RPKI Relying Party Perspective

The Resource Public Key Infrastructure (RPKI) aims to secure internet ro...
research
09/11/2023

Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code

We describe a mechanism to create fair and explainable incentives for so...

Please sign up or login with your details

Forgot password? Click here to reset