Declarative, Temporal, and Practical Programming with Capabilities
| dc.contributor.author | Watson, Robert N. M. | |
| dc.contributor.author | Anderson, Jonathan | |
| dc.contributor.author | Reps, Thomas | |
| dc.contributor.author | Jha, Somesh | |
| dc.contributor.author | Harris, William R. | |
| dc.date.accessioned | 2013-02-28T20:57:19Z | |
| dc.date.available | 2013-02-28T20:57:19Z | |
| dc.date.issued | 2013-02-26 | |
| dc.description.abstract | New operating systems, such as the Capsicum capability system, allow a programmer to write an application that satisfies strong security properties by invoking security- specific system calls at a few key points in the program. However, rewriting an application to invoke such system calls correctly is an error-prone process: even the Capsicum developers have reported difficulties in rewriting programs to correctly invoke system calls. This paper describes capweave, a tool that takes as input (i) an LLVM program, and (ii) declarative specifications of the possibly-changing capabilities that a program must hold during its execution, and rewrites the program to use Capsicum system calls to enforce the policies. Our experiments demonstrate that capweave can be applied to rewrite security-critical UNIX utilities to satisfy practical security properties. capweave itself works quickly, and the amount of runtime overhead incurred in the programs that capweave produces is generally low for practical workloads. | en |
| dc.identifier.citation | TR1785 | en |
| dc.identifier.uri | http://digital.library.wisc.edu/1793/64927 | |
| dc.subject | safety games | en |
| dc.subject | capabilities | en |
| dc.title | Declarative, Temporal, and Practical Programming with Capabilities | en |
| dc.type | Technical Report | en |