• DocumentCode
    467567
  • Title

    Accurate Application-Specific Sandboxing for Win32/Intel Binaries

  • Author

    Li, Wei ; Lam, Lap-chung ; Chiueh, Tzi-cker

  • Author_Institution
    Stony Brook Univ., Stony Brook
  • fYear
    2007
  • fDate
    29-31 Aug. 2007
  • Firstpage
    375
  • Lastpage
    382
  • Abstract
    Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits such software vulnerabilities as buffer overflow to take over the control of a victim application and possibly the underlying machine. The long-standing technical barrier to the acceptance of this system call monitoring approach is how to derive accurate sandboxing policies for Windows applications whose source code is unavailable. In fact, many commercial computer security companies take advantage of this fact and fashion a business model in which their users have to pay a subscription fee to receive periodic updates on the application sandboxing policies, much like anti-virus signatures. This paper describes the design, implementation and evaluation of a sandboxing system called BASS that can automatically extract a highly accurate application-specific sandboxing policy from a Win32/X86 binary, and enforce the extracted policy at run time with low performance overhead. BASS is built on a binary interpretation and analysis infrastructure called BIRD, which can handle application binaries with dynamically linked libraries, exception handlers and multi-threading, and has been shown to work correctly for a large number of commercially distributed Windows- based network applications, including IIS and Apache. The throughput and latency penalty of BASS for all the applications we have tested except one is under 8%.
  • Keywords
    application program interfaces; exception handling; multi-threading; operating systems (computers); security of data; software libraries; API; Win32/Intel binary; application-specific sandboxing policy; binary interpretation-analysis infrastructure; buffer overflow; control-hijacking attack detection; dynamically linked library; exception handling; multithreading; software vulnerability; system call sequence; Application software; Birds; Buffer overflow; Business; Companies; Computer security; Computerized monitoring; Control systems; Libraries; Subscriptions;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance and Security, 2007. IAS 2007. Third International Symposium on
  • Conference_Location
    Manchester
  • Print_ISBN
    0-7695-2876-7
  • Electronic_ISBN
    978-0-7695-2876-2
  • Type

    conf

  • DOI
    10.1109/IAS.2007.86
  • Filename
    4299802