skip to main content
10.1145/3322431.3325414acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
short-paper
Public Access

CMCAP: Ephemeral Sandboxes for Adaptive Access Control

Published:28 May 2019Publication History

ABSTRACT

We present CMCAP (context-mapped capabilities), a decentralized mechanism for specifying and enforcing adaptive access control policies for resource-centric security. Policies in CMCAP express runtime constraints defined as containment domains with context-mapped capabilities, and ephemeral sandboxes for dynamically enforcing desired information flow properties while preserving functional correctness for the sandboxed programs. CMCAP is designed to remediate DAC's weakness and address the inflexibility that makes current MAC frameworks impractical to the common user. We use a Linux-based implementation of CMCAP to demonstrate how a program's dynamic profile is used for access control and intrusion prevention.

References

  1. Steve Barker and Peter J. Stuckey. 2003. Flexible Access Control Policy Specification with Constraint Logic Programming. ACM Trans. Inf. Syst. Secur. , Vol. 6, 4 (Nov. 2003), 501--546. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Mick Bauer. 2006. Paranoid Penguin: An Introduction to Novell AppArmor. Linux J. , Vol. 2006, 148 (Aug. 2006), 13--. http://dl.acm.org/citation.cfm?id=1149826.1149839 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani, G. Ramalingam, and Lakshmisubrahmanyam Velaga. 2008. EON: Modeling and Analyzing Dynamic Access Control Systems with Logic Programs. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08). ACM, New York, NY, USA, 381--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Laurent George, Valérie Viet Triem Tong, and Ludovic Mé. 2009. Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. In Recent Advances in Intrusion Detection , , Engin Kirda, Somesh Jha, and Davide Balzarotti (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 355--356. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel, and Valérie Viet Triem Tong. 2017. Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory. In Software Engineering and Formal Methods , , Alessandro Cimatti and Marjan Sirjani (Eds.). Springer International Publishing, Cham, 1--16.Google ScholarGoogle Scholar
  6. Laurent Georget, Mathieu Jaume, Frédéric Tronel, Guillaume Piolle, and Valérie Viet Triem Tong. 2017. Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux. In 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE). 10--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. William R. Harris , Somesh Jha, Thomas Reps , Jonathan Anderson, and Robert N. M. Watson. 2013. Declarative, Temporal, and Practical Programming with Capabilities. In 2013 IEEE Symposium on Security and Privacy. 18--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Frédéric Cuppens Nora Cuppens-Boulahia Hervé Debar, Yohann Thomas. 2008. Response: bridging the link between intrusion detection alerts and security policies. Advances in Information Security, Vol. 38. Springer-Verlag, New York, NY.Google ScholarGoogle Scholar
  9. Boniface Hicks, Sandra Rueda, Luke St.Clair, Trent Jaeger, and Patrick McDaniel. 2010. A Logical Specification and Analysis for SELinux MLS Policy. ACM Trans. Inf. Syst. Secur. , Vol. 13, 3, Article 26 (July 2010), bibinfonumpages31 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Maxwell Krohn, Alexander Yip, Micah Brodsky, Natan Cliffer, M. Frans Kaashoek, Eddie Kohler, and Robert Morris. 2007. Information Flow Control for Standard OS Abstractions. SIGOPS Oper. Syst. Rev. , Vol. 41, 6 (Oct. 2007), 321--334. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Prasad Naldurg and Raghavendra K.R. 2011. SEAL: A Logic Programming Framework for Specifying and Verifying Access Control Models. In Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT '11). ACM, New York, NY, USA, 83--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Prasad Naldurg, Stefan Schwoon, Sriram Rajamani, and John Lambert. 2006. NETRA:: Seeing Through Access Control. In Proceedings of the Fourth ACM Workshop on Formal Methods in Security (FMSE '06). ACM, New York, NY, USA, 55--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Indrajit Roy, Donald E. Porter, Michael D. Bond, Kathryn S. McKinley, and Emmett Witchel. 2009. Laminar: Practical Fine-grained Decentralized Information Flow Control. SIGPLAN Not. , Vol. 44, 6 (June 2009), 63--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Robert N. M. Watson, Jonathan Anderson, Ben Laurie, and Kris Kennaway. 2010. Capsicum: practical capabilities for UNIX. In Proceedings of the 19th USENIX Security Symposium . http://www.cl.cam.ac.uk/research/security/capsicum/papers/2010usenix-security-capsicum-website.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, and Greg Kroah-Hartman. 2002. Linux Security Modules: General Security Support for the Linux Kernel. In Proceedings of the 11th USENIX Security Symposium. USENIX Association, Berkeley, CA, USA, 17--31. http://dl.acm.org/citation.cfm?id=647253.720287 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. CMCAP: Ephemeral Sandboxes for Adaptive Access Control

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies
        May 2019
        243 pages
        ISBN:9781450367530
        DOI:10.1145/3322431

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 May 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        SACMAT '19 Paper Acceptance Rate12of52submissions,23%Overall Acceptance Rate177of597submissions,30%

        Upcoming Conference

        SACMAT 2024
      • Article Metrics

        • Downloads (Last 12 months)43
        • Downloads (Last 6 weeks)5

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader