Show simple item record

Efficient, Verifiable Binary Sandboxing for a CISC Architecture

dc.date.accessioned2005-12-22T02:28:49Z
dc.date.accessioned2018-11-24T10:24:28Z
dc.date.available2005-12-22T02:28:49Z
dc.date.available2018-11-24T10:24:28Z
dc.date.issued2005-05-02
dc.identifier.urihttp://hdl.handle.net/1721.1/30542
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/30542
dc.description.abstractExecuting untrusted code while preserving security requiresenforcement of memory and control-flow safety policies:untrusted code must be prevented from modifying memory orexecuting code except as explicitly allowed. Software-basedfault isolation (SFI) or \"sandboxing\" enforces thosepolicies by rewriting the untrusted code at the level ofindividual instructions. However, the original sandboxingtechnique of Wahbe et al. is applicable only to RISCarchitectures, and other previous work is either insecure,or has been not described in enough detail to giveconfidence in its security properties. We present a noveltechnique that allows sandboxing to be easily applied to aCISC architecture like the IA-32. The technique can beverified to have been applied at load time, so that neitherthe rewriting tool nor the compiler needs to be trusted. Wedescribe a prototype implementation which provides a robustsecurity guarantee, is scalable to programs of any size, andhas low runtime overheads. Further, we give amachine-checked proof that any program approved by theverification algorithm is guaranteed to respect the desiredsafety property.
dc.format.extent17 p.
dc.format.extent29512899 bytes
dc.format.extent1053603 bytes
dc.language.isoen_US
dc.titleEfficient, Verifiable Binary Sandboxing for a CISC Architecture


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2005-030.pdf1.053Mbapplication/pdfView/Open
MIT-CSAIL-TR-2005-030.ps29.51Mbapplication/postscriptView/Open

This item appears in the following Collection(s)

Show simple item record