Show simple item record

dc.contributor.authorMcCamant, Stephen
dc.contributor.authorMorrisett, Greg
dc.contributor.otherProgram Analysis
dc.date.accessioned2005-12-22T02:28:49Z
dc.date.available2005-12-22T02:28:49Z
dc.date.issued2005-05-02
dc.identifier.otherMIT-CSAIL-TR-2005-030
dc.identifier.otherMIT-LCS-TR-988
dc.identifier.urihttp://hdl.handle.net/1721.1/30542
dc.description.abstractExecuting untrusted code while preserving security requiresenforcement of memory and control-flow safety policies:untrusted code must be prevented from modifying memory orexecuting code except as explicitly allowed. Software-basedfault isolation (SFI) or \"sandboxing\" enforces thosepolicies by rewriting the untrusted code at the level ofindividual instructions. However, the original sandboxingtechnique of Wahbe et al. is applicable only to RISCarchitectures, and other previous work is either insecure,or has been not described in enough detail to giveconfidence in its security properties. We present a noveltechnique that allows sandboxing to be easily applied to aCISC architecture like the IA-32. The technique can beverified to have been applied at load time, so that neitherthe rewriting tool nor the compiler needs to be trusted. Wedescribe a prototype implementation which provides a robustsecurity guarantee, is scalable to programs of any size, andhas low runtime overheads. Further, we give amachine-checked proof that any program approved by theverification algorithm is guaranteed to respect the desiredsafety property.
dc.format.extent17 p.
dc.format.extent29512899 bytes
dc.format.extent1053603 bytes
dc.format.mimetypeapplication/postscript
dc.format.mimetypeapplication/pdf
dc.language.isoen_US
dc.relation.ispartofseriesMassachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory
dc.titleEfficient, Verifiable Binary Sandboxing for a CISC Architecture


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record