Repository logo
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Scholalry Output
  3. Publications
  4. Tainted Secure Multi-Execution to Restrict Attacker Influence
 
  • Details

Tainted Secure Multi-Execution to Restrict Attacker Influence

Source
Ccs 2023 Proceedings of the 2023 ACM Sigsac Conference on Computer and Communications Security
Date Issued
2021-11-21
Author(s)
McCall, McKenna
Bichhawat, Abhishek  
Jia, Limin
DOI
10.1145/3576915.3623110
Abstract
Attackers can steal sensitive user information from web pages via third-party scripts. Prior work shows that secure multi-execution (SME) with declassification is useful for mitigating such attacks, but that attackers can leverage dynamic web features to declassify more than intended. The proposed solution of disallowing events from dynamic web elements to be declassified is too restrictive to be practical; websites that declassify events from dynamic elements cannot function correctly. In this paper, we present SME<sup>T</sup>, a new information flow monitor based on SME which uses taint tracking within each execution to remember what has been influenced by an attacker. The resulting monitor is more permissive than what was proposed by prior work and satisfies both knowledge- and influence-based definitions of security for confidentiality and integrity policies (respectively). We also show that robust declassification follows from our influence-based security condition, for free. Finally, we examine the performance impact of monitoring attacker influence with SME by implementing SME<sup>T</sup> on top of Featherweight Firefox.
Publication link
https://dl.acm.org/doi/pdf/10.1145/3576915.3623110
URI
https://d8.irins.org/handle/IITG2025/27151
Subjects
information flow | knowledge-based noninterference | robust declassification | secure multi-execution | taint tracking
IITGN Knowledge Repository Developed and Managed by Library

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify