Loading...

A Secure Approach for Using Third Party Libraries in Mashup Applications

Karimi Menjarmouei, Mostsfa | 2019

380 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 52217 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Hemmatyar, Ali Mohammad Afshin
  7. Abstract:
  8. Reusing third-party libraries is inevitable to reach an acceptable development time and cost in current application development methodologies. As these libraries are placed in the address space of the native application, they have the same access rights as it.These libraries may contain deliberate or unintended bugs that result in security vulnerabilities.Previous approaches to limit access rights of these libraries either lack a comprehensive control over different resources, e.g., they prevent unprivileged access to RAM while illegal disk or network access is still possible, or impose significant performance overhead.In this thesis, we have presented a secure approach to third-party library reuse that enables flexible tuning of access rights. To this end, we perform function calls through an interface that makes use of the various capabilities provided by the Linux kernel, such as, namespaces, memory maps, and syscalls to sandbox libraries.The proposed method has been evaluated over different benchmarks. experimental results show the capability of the proposed approach in limiting the CPU usage of a malicious bitcoin mining library, preventing unprivileged disk access and avoiding network access by a browser extension. The performance overhead of the proposed approach has been measured by implementing it in the Mibench benchmarks. experimental show less than 15% performance overhead
  9. Keywords:
  10. Secure Approach ; Third-party Libraries ; Sandbox ; Name Spaces ; Memory Map

 Digital Object List

 Bookmark

...see more