skip to main content
10.1145/2897845.2897912acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

StemJail: Dynamic Role Compartmentalization

Published: 30 May 2016 Publication History

Abstract

While users tend to indiscriminately use the same device to address every need, exfiltration of information becomes the end game of attackers. Average users need realistic and practical solutions to enable them to mitigate the consequences of a security breach in terms of data leakage. We present StemJail, an open-source security solution to isolate groups of processes pertaining to the same activity into an environment exposing only the relevant subset of user data. At the heart of our solution lies dynamic activity discovery, allowing seamless integration of StemJail into the user workflow. Our userland access control framework only relies on the ability of user to organize data in directories. Thus, it is easily configurable and requires very little user interaction once set up. Moreover, StemJail is designed to run without intrusive changes to the system and to be configured and used by any unprivileged user thanks to the Linux user namespaces.

References

[1]
A. Acharya and M. Raje. MAPbox: Using parameterized behavior classes to con ne untrusted applications. In USENIX Security Symposium, 2000.
[2]
B. Anderson, L. Bergstrom, M. Goregaokar, J. Matthews, K. McAllister, J. Moffitt, and S. Sapin. Engineering the Servo Web Browser Engine using Rust. In ICSE, 2016.
[3]
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. A domain and type enforcement UNIX prototype. In USENIX Security Symposium, 1995.
[4]
A. Barth, C. Jackson, C. Reis, and Google Chrome Team. The Security Architecture of the Chromium Browser, 2008.
[5]
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations. Technical report, MITRE Corp., 1973.
[6]
S. Bhattiprolu, E. W. Biederman, S. Hallyn, and D. Lezcano. Virtual servers and checkpoint/restart in mainstream Linux. ACM SIGOPS Operating Systems Review, 2008.
[7]
M. Bishop and M. Dilger. Checking for race conditions in le accesses. Computing systems, 1996.
[8]
D. Blazakis. The Apple Sandbox. In Black Hat DC, 2011.
[9]
D. F. Brewer and M. J. Nash. The Chinese Wall Security Policy. In Security and Privacy, 1989.
[10]
W. Drewry. Dynamic seccomp policies (using BPF filters), 2012. https://lwn.net/Articles/475019/.
[11]
D. Ferraiolo and R. Kuhn. Role-Based Access Control. In NIST-NCSC, 1992.
[12]
N. Feske and C. Helmuth. A Nitpicker's guide to a minimal-complexity secure GUI. In ACSAC, 2005.
[13]
T. Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. In NDSS, 2003.
[14]
T. Garfinkel, B. Pfa, and M. Rosenblum. Ostia: A Delegating Architecture for Secure System Call Interposition. In NDSS, 2004.
[15]
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications (Confining the wily hacker). In USENIX Security Symposium, 1996.
[16]
N. Hardy. The Confused Deputy (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review, 1988.
[17]
T. Kim and N. Zeldovich. Practical and E ective Sandboxing for Non-root Users. In USENIX Annual Technical Conference, 2013.
[18]
Z. Liang, V. Venkatakrishnan, and R. Sekar. Isolated program execution: An application transparent approach for executing untrusted programs. In ACSAC, 2003.
[19]
S. Potter and J. Nieh. Apiary: Easy-to-Use Desktop Application Fault Containment on Commodity Operating Systems. In USENIX Annual Technical Conference, 2010.
[20]
N. Provos. Improving Host Security with System Call Policies. In USENIX Security Symposium, 2003.
[21]
M. Russinovich. Inside windows vista user account control. Microsoft TechNet Magazine, 2007.
[22]
J. Rutkowska and R. Wojtczuk. Qubes OS architecture. 2010.
[23]
M. Salaun. StemJail source code, 2015. https://github.com/stemjail.
[24]
Z. C. Schreuders, T. McGill, and C. Payne. The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls. Computers & Security, 2013.
[25]
K. M. Walker, D. F. Sterne, M. L. Badger, M. J. Petkac, D. L. Shermann, and K. A. Oostendorp. Confining root programs with domain and type enforcement. In USENIX Security Symposium, 1996.
[26]
R. N. Watson, J. Anderson, B. Laurie, and K. Kennaway. Capsicum: Practical Capabilities for UNIX. In USENIX Security Symposium, 2010.

Index Terms

  1. StemJail: Dynamic Role Compartmentalization

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
    May 2016
    958 pages
    ISBN:9781450342339
    DOI:10.1145/2897845
    Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 May 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. compartmentalization
    2. dynamic policy
    3. linux
    4. namespaces
    5. role
    6. sandbox
    7. user activity

    Qualifiers

    • Research-article

    Conference

    ASIA CCS '16
    Sponsor:

    Acceptance Rates

    ASIA CCS '16 Paper Acceptance Rate 73 of 350 submissions, 21%;
    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 147
      Total Downloads
    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media