Intent Semantics in the ABI
Sergey Bratus, Julian Bangert
Intent Semantics in the ABI Sergey Bratus, Julian Bangert Outline - - PowerPoint PPT Presentation
Intent Semantics in the ABI Sergey Bratus, Julian Bangert Outline From faulty classic policies to a new sweet spot ABI-level objects and security policy ABI-level policy examples Why this works on x86 Future directions
Sergey Bratus, Julian Bangert
entire process
any number of times
VM lookup?
labelling scheme?
Virtual memory Valuable Objects
MMU
http://www.tomdalling.com/blog/software-design/solid-class-design-the-liskov-substitution-principle/
http://cr.yp.to/qmail/qmailsec-20071101.pdf
components/functional units a-la qmail
reflect their intent, often uniquely
after loading
.PNG file Bitmap
libpng
malicious .PNG Bitmap with leaked data .PNG file private key
libpng w/ bugs
no-longer-private key
malicious .PNG Bitmap overwrites critical data .PNG file, with exploit
libpng w/ bugs
Authorized keys
malicious .PNG private key
libssl .data
bitmap
libpng .input libpng .output
different permissions
libssl.data
libpng.input and libpng.output
read by libpng.
SSL initialization SSL libpng app logic SSL keys Input buffer Output buffer
RW R RW R W RW
http://upload.wikimedia.org/wikipedia/commons/a/a6/Professor_Lucifer_Butts.gif
address space
the address space, reusing existing TLB invalidation primitives.
NGINX benchmark isolating all libraries
don't have to suffer them
context-dependent and can be easily modified
producing a bootable system
be disabled/enabled without flushing caches
to reduce supervisor entries.
in kernel mode
suitable basis for policy
runtime are the sweet spot for security policy
programmers intent w.r.t. code and data units
standard build/binary tool chains