Retrofitting Legacy Code for Authorization Policy Enforcement

dc.contributor.authorGanapathy, Vinoden_US
dc.contributor.authorJaeger, Trenten_US
dc.contributor.authorJha, Someshen_US
dc.date.accessioned2012-03-15T17:19:45Z
dc.date.available2012-03-15T17:19:45Z
dc.date.created2005en_US
dc.date.issued2005en_US
dc.description.abstractResearchers have long argued that the best way to construct a secure system is to proactively integrate security into the design of the system. However, this tenet is rarely followed because of economic and practical considerations. Instead, security mechanisms are added as the need arises, by retrofitting legacy code. Unfortunately, existing techniques to do so are manual and adhoc, and often result in security holes in the retrofitted code. We show that program analysis techniques can be used to securely, and largely automatically, retrofit legacy code for authorization policy enforcement. Our techniques are applicable to a large class of legacy servers, namely those that simultaneously manage multiple clients, possibly with different security labels. It is important for such servers to ensure that client interaction is governed by an authorization policy. We demonstrate our ideas using two program analysis tools we built, Aid and Alpen, which work together to automate the process of retrofitting legacy servers with mechanisms for authorization policy enforcement. We show that an X server retrofitted using these tools securely enforces authorization policies on its X clients.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationTR1544en_US
dc.identifier.urihttp://digital.library.wisc.edu/1793/60470
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleRetrofitting Legacy Code for Authorization Policy Enforcementen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR1544.pdf
Size:
201.92 KB
Format:
Adobe Portable Document Format