Preventing privilege escalation

  • Authors:
  • Niels Provos;Markus Friedl;Peter Honeyman

  • Affiliations:
  • CITI, University of Michigan;GeNUA;CITI, University of Michigan

  • Venue:
  • SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
  • Year:
  • 2003

Quantified Score

Hi-index 0.02

Visualization

Abstract

We introduce a system that eliminates the need to run programs in privileged process contexts. Using our system, programs run unprivileged but may execute certain operations with elevated privileges as determined by a configurable policy eliminating the need for suid or sgid binaries. We present the design and analysis of the "Systrace" facility which supports fine grained process confinement, intrusion detection, auditing and privilege elevation. It also facilitates the often difficult process of policy generation. With Systrace, it is possible to generate policies automatically in a training session or generate them interactively during program execution. The policies describe the desired behavior of services or user applications on a system call level and are enforced to prevent operations that are not explicitly permitted. We show that Systrace is efficient and does not impose significant performance penalties.