Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Safe loading - A foundation for secure execution of untrusted programs
 
conference paper

Safe loading - A foundation for secure execution of untrusted programs

Payer, Mathias  
•
Hartmann, Tobias
•
Gross, Thomas R.
2012
Proceedings - IEEE Symposium on Security and Privacy
33rd IEEE Symposium on Security and Privacy, S and P 2012

The standard loader (ld.so) is a common target of attacks. The loader is a trusted component of the application, and faults in the loader are problematic, e.g., they may lead to local privilege escalation for SUID binaries. Software-based fault isolation (SFI) provides a framework to execute arbitrary code while protecting the host system. A problem of current approaches to SFI is that fault isolation is decoupled from the dynamic loader, which is treated as a black box. The sandbox has no information about the (expected) execution behavior of the application and the connections between different shared objects. As a consequence, SFI is limited in its ability to identify devious application behavior. This paper presents a new approach to run untrusted code in a user-space sandbox. The approach replaces the standard loader with a security-aware trusted loader. The secure loader and the sandbox together cooperate to allow controlled execution of untrusted programs. A secure loader makes security a first class concept and ensures that the SFI system does not allow any unchecked code to be executed. The user-space sandbox builds on the secure loader and subsequently dynamically checks for malicious code and ensures that all control flow instructions of the application adhere to an execution model. The combination of the secure loader and the user-space sandbox enables the safe execution of untrusted code in user-space. Code injection attacks are stopped before any unintended code is executed. Furthermore, additional information provided by the loader can be used to support additional security properties, e.g., in lining of Procedure Linkage Table calls reduces the number of indirect control flow transfers and therefore limits jump-oriented attacks. This approach implements a secure platform for privileged applications and applications reachable over the network that anticipates and confines security threats from the beginning. © 2012 IEEE.

  • Details
  • Metrics
Type
conference paper
DOI
10.1109/SP.2012.11
Scopus ID

2-s2.0-84872100834

Author(s)
Payer, Mathias  

École Polytechnique Fédérale de Lausanne

Hartmann, Tobias

ETH Zürich

Gross, Thomas R.

ETH Zürich

Date Issued

2012

Publisher

Institute of Electrical and Electronics Engineers Inc.

Published in
Proceedings - IEEE Symposium on Security and Privacy
ISBN of the book

9780769546810

Article Number

6234402

Start page

18

End page

32

Subjects

process creation

•

sandboxing

•

secure loading

•

software-based fault isolation

Editorial or Peer reviewed

REVIEWED

Written at

OTHER

EPFL units
HEXHIVE  
Event nameEvent acronymEvent placeEvent date
33rd IEEE Symposium on Security and Privacy, S and P 2012

United States

2012-05-21 - 2012-05-23

Available on Infoscience
April 4, 2025
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/248647
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés