OS, Virtualization and Transparent Runtime Techniques
One of the principal challenges in security is that of securing the large base of existing software. This necessitates the development of transparent runtime techniques that can enhance the security of third-party applications without requiring source-code changes or even a recompilation. The principal mechanisms for realizing such security enhancements include:
-
System-call interception. Since every security-relevant action needs to be ultimately effected via a system call, security of benign applications can be enhanced by monitoring system calls, and detecting anomalies that may be indicative of exploits. System-call monitoring could also be used to sandbox untrusted applications. We have developed a number of intrusion detection and and policy enforcement techniques based on system-call interposition, and developed efficient and portable techniques for this task.
-
Library and/or network interposition. Another way to transparently monitor and/or alter COTS behavior is to intercept (and possibly alter) the library calls made by (or the network traffic from) the COTS application. Several of our techniques exploit library (rather than system-call) interposition where appropriate (i.e., it is secure, and provides a more convenient interface.)
-
OS enhancements and virtualization techniques. An alternative to library or system-call interposition is that of implementing security enhancements in the operating system. For instance, our safe-execution environments isolate untrusted programs by using file system virtualization, whereas our VNetLab research relies on datalink layer virtualization for providing strong isolation between networks used for security experiments, while still enabling these networks to be accessed remotely.
Related Publications
- [1] eAudit: A Fast, Scalable and Deployable Audit Data Collection System
IEEE Symposium on Security and Privacy (IEEE S&P) May, 2024. (Software release).
, and - [2] A New Tag-Based Approach for Real-Time Detection of Advanced Cyber Attacks
PhD Dissertation (Stony Brook University) January, 2022.- [3] Efficient Audit Data Collection for Linux
Master's Thesis (Stony Brook University) August, 2021.- [4] Securing Web Applications
PhD Dissertation (Stony Brook University) May, 2016.- [5] Hardening OpenStack Cloud Platforms against Compute Node Compromises
ACM Symposium on Information, Computer and Communications Security (ASIACCS) May, 2016.
, and - [6] Enhancing Multi-user OS with Network Provenance for Systematic Malware Defense
PhD Dissertation (Stony Brook University) May, 2016.- [7] JaTE: Transparent and Efficient JavaScript Confinement
Annual Computer Security Applications Conference (ACSAC) December, 2015.
, and - [8] Provenance-based Integrity Protection for Windows
Annual Computer Security Applications Conference (ACSAC) December, 2015.
and - [9] Harbormaster: Policy Enforcement for Containers
IEEE CloudCom (CloudCom) November, 2015.
, and - [10] Towards More Usable Information Flow Policies for Contemporary Operating Systems
ACM Symposium on Access Control Models and Technologies (SACMAT) June, 2014.Honorable mention for Best paper .
, and - [11] Comprehensive Integrity Protection for Desktop Linux (Demo)
ACM Symposium on Access Control Models and Technologies (SACMAT) June, 2014.
and - [12] A Platform for Secure Static Binary Instrumentation
Virtual Execution Environments (VEE) March, 2014.
, , and - [13] A Portable User-Level Approach for System-wide Integrity Protection
Annual Computer Security Applications Conference (ACSAC) December, 2013.
and - [14] Control Flow Integrity for COTS Binaries
USENIX Security Symposium (USENIX Security) August, 2013.Best paper award! .
and - [15] Protection, Usability and Improvements in Reflected XSS Filters
ACM Symposium on Information, Computer and Communications Security (ASIACCS) May, 2012.
and - [16] A Server- and Browser-Transparent CSRF Defense for Web 2.0 Applications
Annual Computer Security Applications Conference (ACSAC) December, 2011.
and - [17] Online Signature Generation for Windows Systems
Annual Computer Security Applications Conference (ACSAC) December, 2009.
, and - [18] Practical Techniques for Regeneration and Immunization of COTS Applications
Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS) June, 2009.
, , , and - [19] An Efficient Black-box Technique for Defeating Web Application Attacks
ISOC Network and Distributed Systems Symposium (NDSS) February, 2009.- [20] Alcatraz: An Isolated Environment for Experimenting with Untrusted Software
ACM Transactions on Information and System Security (TISSEC) January, 2009.
, , and - [21] Expanding Malware Defense by Securing Software Installations
Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA) July, 2008.
, , and - [22] V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments
Workshop on Cyber Security Experimentation and Test (in conjunction with USENIX Security) (CSET) July, 2008.
, , and - [23] Practical Proactive Integrity Preservation: A Basis for Malware Defense
IEEE Symposium on Security and Privacy (IEEE S&P) May, 2008.
, , and - [24] Address-Space Randomization for Windows Systems
Annual Computer Security Applications Conference (ACSAC) December, 2006.
, and - [25] Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models
Annual Computer Security Applications Conference (ACSAC) December, 2005. (Supercedes Technical Report SECLAB-05-01 An Immune System Inspired Approach for Protection from Repetitive Attacks, March 2005.).
and - [26] Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers
ACM Conference on Computer and Communications Security (CCS) November, 2005. (Supercedes Technical Report SECLAB-05-02 Automated, Sub-second Attack Signature Generation: A Basis for Building Self-Protecting Servers, May 2005.).
and - [27] V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer Security
Annual Colloquium for Information Systems Security Education (CISSE) June, 2005.
, , , and - [28] Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems (Short Paper)
USENIX Annual Technical Conference (USENIX) April, 2005.
, and - [29] One-way Isolation: An Effective Approach for Realizing Safe Execution Environments
ISOC Network and Distributed Systems Symposium (NDSS) February, 2005. (Revised version of conference paper).
, , and - [30] Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
Annual Computer Security Applications Conference (ACSAC) December, 2003. Best paper award.
, and - [31] Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications
ACM Symposium on Operating Systems Principles (SOSP) October, 2003.
, , , and - [32] Experiences with Specification Based Intrusion Detection System
Recent Advances in Intrusion Detection (RAID) October, 2001.
and - [33] Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security
New Security Paradigms Workshop (NSPW) September, 2001.
, , and - [34] A Fast Automaton-Based~Method for Detecting Anomalous Program Behaviors
IEEE Symposium on Security and Privacy (IEEE S&P) May, 2001.
, , and - [35] Building Survivable Systems: An Integrated Approach based on Intrusion Detection and Damage Containment
DISCEX (DISCEX) February, 2000.
, , , , and - [36] User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
ISOC Network and Distributed Systems Symposium (NDSS) February, 2000.
and