skip to main content
10.1145/3450569.3464396acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
poster

Poster: Shielding AppSPEAR - Enhancing Memory Safety for Trusted Application-level Security Policy Enforcement

Published: 11 June 2021 Publication History

Abstract

This paper tackles the problem of memory-safe implementation of the AppSPEAR framework for application-level security policy enforcement. We contribute with a feasibility study that demonstrates the performance overhead of applying Rust's memory safety features on top of SGX trusted execution technology.

References

[1]
James P. Anderson. 1972. Computer Security Technology Planning Study. Rep. ESD-TR-73--51.
[2]
Jinfu Chen, Weiyi Shang, Ahmed E. Hassan, Yong Wang, and Jiangbin Lin. 2019. An Experience Report of Generating Load Tests Using Log-recovered Workloads at Varying Granularities of User Behaviour. In ASE '19.
[3]
David Ferraiolo, Ramaswamy Chandramouli, Rick Kuhn, and Vincent Hu. 2016. Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). In ABAC '16.
[4]
Intel Corp. 2019. Intel® SGX. https://software.intel.com/en-us/sgx.
[5]
Peter A. Loscocco and Stephen D. Smalley. 2001. Integrating Flexible Support for Security Policies into the Linux Operating System. In ATC '01.
[6]
Nicholas D. Matsakis and Felix S. Klock. 2014. The Rust Language. In HILT '14.
[7]
OpenMRS Inc. 2020. https://wiki.openmrs.org/display/RES/Demo+Data.
[8]
Marius Schlegel. 2021. Trusted Enforcement of Application-specific Security Policies .arxiv: 2105.01970
[9]
Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, and Zhiqiang Lin. 2019. Towards Memory Safe Enclave Programming with Rust-SGX. In CCS '19.
[10]
Robert N. M. Watson. 2013. A Decade of OS Access-control Extensibility. ACM Queue, Vol. 11, 1 (2013).

Cited By

View all
  • (2023)Trusted Implementation and Enforcement of Application Security PoliciesE-Business and Telecommunications10.1007/978-3-031-36840-0_16(362-388)Online publication date: 22-Jul-2023
  • (2023)Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control PoliciesE-Business and Telecommunications10.1007/978-3-031-36840-0_12(249-280)Online publication date: 22-Jul-2023
  • (2021)Access Control ModelsCybernetics and Information Technologies10.2478/cait-2021-004421:4(77-104)Online publication date: 1-Dec-2021

Index Terms

  1. Poster: Shielding AppSPEAR - Enhancing Memory Safety for Trusted Application-level Security Policy Enforcement

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SACMAT '21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies
      June 2021
      194 pages
      ISBN:9781450383653
      DOI:10.1145/3450569
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 June 2021

      Check for updates

      Author Tags

      1. Intel SGX
      2. application-level security policy enforcement
      3. memory safety
      4. rust
      5. trusted execution

      Qualifiers

      • Poster

      Conference

      SACMAT '21
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 177 of 597 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 27 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Trusted Implementation and Enforcement of Application Security PoliciesE-Business and Telecommunications10.1007/978-3-031-36840-0_16(362-388)Online publication date: 22-Jul-2023
      • (2023)Putting the Pieces Together: Model-Based Engineering Workflows for Attribute-Based Access Control PoliciesE-Business and Telecommunications10.1007/978-3-031-36840-0_12(249-280)Online publication date: 22-Jul-2023
      • (2021)Access Control ModelsCybernetics and Information Technologies10.2478/cait-2021-004421:4(77-104)Online publication date: 1-Dec-2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media