Back to Search Start Over

Utilizing Binary Rewriting for Improving End-Host Security.

Authors :
Yougang Song
Fleisch, Brett D.
Source :
IEEE Transactions on Parallel & Distributed Systems; Dec2007, Vol. 18 Issue 12, p1687-1699, 13p, 1 Diagram, 4 Charts, 16 Graphs
Publication Year :
2007

Abstract

Conventional methods supporting Java binary security mainly rely on the security of the host Java Virtual Machine (JVM). However, malicious Java binaries keep exploiting the vulnerabilities of JVMs, escaping their sandbox restrictions and allowing attacks on end-user systems. Administrators must confront the difticulties and dilemmas brought on by security upgrades. On the other hand, binary rewriting techniques have been advanced to allow users to enforce security policies directly on the mobile code. They have the advantages of supporting a richer set of security policies and a self-constrained written code. However, the high administrative and performance overhead caused by security configuration and code rewriting have prevented rewriters from becoming a practical security tool. In this paper, we address these problems by integrating binary code rewriters with Web caching proxies and build the security system called PB-JARS, a Proxy-based JAva Rewriting System. PB-JARS works as a complimentary system to existing JVM security mechanisms by placing another line of defense between users and their end-user systems. It gives system administrators centralized security control and management for the mobile code and security policies. We evaluated PB-JARS using a real Java binary traffic model derived from analyzing real Web trace records. Our results show that adding binary rewriting to a Web caching system can be very efficient in improving end-host security at a low cost. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
10459219
Volume :
18
Issue :
12
Database :
Complementary Index
Journal :
IEEE Transactions on Parallel & Distributed Systems
Publication Type :
Academic Journal
Accession number :
27711019
Full Text :
https://doi.org/10.1109/TPDS.2007.1083