Integrity Walls: Finding Attack Surfaces From Mandatory Access Control Policies

Adding new programs or configuration options to a system often leads to new exploits because it provides adversaries with new ways to access possible vulnerabilities. As a result, application developers often must react to exploits as they are found. One proactive defense is to protect programs at their attack surfaces, the program entry points (e.g., system calls) accessible to adversaries. However, experience has shown that developers often fail to defend these entry points because they do not locate all such system calls where programs access system resources controlled by attackers.

Provided by: Association for Computing Machinery Topic: Security Date Added: May 2012 Format: PDF

Find By Topic