Reusability of Functionality-Based Application Confinement Policy Abstractions

  • Authors:
  • Z. Cliffe Schreuders;Christian Payne

  • Affiliations:
  • School of IT, Murdoch University, Murdoch, Australia WA 6150;School of IT, Murdoch University, Murdoch, Australia WA 6150

  • Venue:
  • ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Traditional access control models and mechanisms struggle to contain the threats posed by malware and software vulnerabilities as these cannot differentiate between processes acting on behalf of users and those posing threats to users' security as every process executes with the full set of the user's privileges. Existing application confinement schemes attempt to address this by limiting the actions of particular processes. However, the management of these mechanisms requires security-specific expertise which users and administrators often do not possess. Further, these models do not scale well to confine the large number of applications found on functionality-rich contemporary systems. This paper describes how the principles of role-based access control (RBAC) can be applied to the problem of restricting an application's behaviour. This approach provides a more flexible, scalable and easier to manage confinement paradigm that requires far less in terms of user expertise than existing schemes. Known as functionality-based application confinement (FBAC), this model significantly mitigates the usability limitations of existing approaches. We present a case study of a Linux-based implementation of FBAC known as FBAC-LSM and demonstrate the flexibility and scalability of the FBAC model by analysing policies for the confinement of four different web browsers.