AbstractWe introduce a method, Lightweight Privilege Separation, enabling safe execution of unreliable software. Our method introduces no new software vulnerabilities and is fairly easy to implement. Furthermore, we show by experiments that the execution overhead is in the order of milliseconds per execution of the unreliable process at hand. We compare our method with earlier attempts of privilege separation such as OpenSSH. The paper concludes with a discussion on generalizations of our approach in the form of abstract machines and their interpreters
Sting applications often contain security holes that are not patched until after the system has alre...
This paper is about ensuring security in unreliable systems. We studysystems which are subject to tr...
Supporting security principles, like least privilege, in a software architecture is difficult due to...
AbstractWe introduce a method, Lightweight Privilege Separation, enabling safe execution of unreliab...
Many operating system services require special privileges to execute their tasks. A programming erro...
Hackers leverage software vulnerabilities to disclose, tamper with, or destroy sensitive data. To p...
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables ...
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables ...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
I, Andrea Bittau, confirm that the work presented in this thesis is my own. Where information has be...
ii Protecting running applications is a hard problem. Many applications are written in a low-level l...
Abstract—The standard loader (ld.so) is a common target of attacks. The loader is a trusted componen...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Abstract. This paper is about ensuring security in unreliable systems. We study systems which are su...
We propose a new formal criterion for secure compilation, giving strong end-to-end security guarante...
Sting applications often contain security holes that are not patched until after the system has alre...
This paper is about ensuring security in unreliable systems. We studysystems which are subject to tr...
Supporting security principles, like least privilege, in a software architecture is difficult due to...
AbstractWe introduce a method, Lightweight Privilege Separation, enabling safe execution of unreliab...
Many operating system services require special privileges to execute their tasks. A programming erro...
Hackers leverage software vulnerabilities to disclose, tamper with, or destroy sensitive data. To p...
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables ...
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables ...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
I, Andrea Bittau, confirm that the work presented in this thesis is my own. Where information has be...
ii Protecting running applications is a hard problem. Many applications are written in a low-level l...
Abstract—The standard loader (ld.so) is a common target of attacks. The loader is a trusted componen...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Abstract. This paper is about ensuring security in unreliable systems. We study systems which are su...
We propose a new formal criterion for secure compilation, giving strong end-to-end security guarante...
Sting applications often contain security holes that are not patched until after the system has alre...
This paper is about ensuring security in unreliable systems. We studysystems which are subject to tr...
Supporting security principles, like least privilege, in a software architecture is difficult due to...