TY - GEN
T1 - An architecture for enforcing end-to-end access control over web applications
AU - Hicks, Boniface
AU - Rueda, Sandra
AU - King, Dave
AU - Moyer, Thomas
AU - Schiffman, Joshua
AU - Sreenivasan, Yogesh
AU - McDaniel, Patrick
AU - Jaeger, Trent
PY - 2010
Y1 - 2010
N2 - The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from multiple applications originating at multiple sources all intermix in a single web browser, making sensitive data stored in the browser subject to a broad milieu of attacks (cross-site scripting, crosssite request forgery and others). The fundamental problem is that existing web infrastructure provides no means for enforcing end-to-end security on data. To solve this we design an architecture using mandatory access control (MAC) enforcement. We overcome the limitations of traditional MAC systems, implemented solely at the operating system layer, by unifying MAC enforcement across virtual machine, operating system, networking and application layers. We implement our architecture using Xen virtual machine management, SELinux at the operating system layer, labeled IPsec for networking and our own label-enforcing web browser, called FlowwolF. We tested our implementation and find that it performs well, supporting data intermixing while still providing end-to-end security guarantees.
AB - The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from multiple applications originating at multiple sources all intermix in a single web browser, making sensitive data stored in the browser subject to a broad milieu of attacks (cross-site scripting, crosssite request forgery and others). The fundamental problem is that existing web infrastructure provides no means for enforcing end-to-end security on data. To solve this we design an architecture using mandatory access control (MAC) enforcement. We overcome the limitations of traditional MAC systems, implemented solely at the operating system layer, by unifying MAC enforcement across virtual machine, operating system, networking and application layers. We implement our architecture using Xen virtual machine management, SELinux at the operating system layer, labeled IPsec for networking and our own label-enforcing web browser, called FlowwolF. We tested our implementation and find that it performs well, supporting data intermixing while still providing end-to-end security guarantees.
UR - http://www.scopus.com/inward/record.url?scp=77954942438&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77954942438&partnerID=8YFLogxK
U2 - 10.1145/1809842.1809870
DO - 10.1145/1809842.1809870
M3 - Conference contribution
AN - SCOPUS:77954942438
SN - 9781450300490
T3 - Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
SP - 163
EP - 172
BT - SACMAT'10 - Proceedings of the 15th ACM Symposium on Access Control Models and Technologies
T2 - 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010
Y2 - 9 June 2010 through 11 June 2010
ER -