Evaluating the Flexibility of the Java Sandbox
Title | Evaluating the Flexibility of the Java Sandbox |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, Joshua Sunshine |
Conference Name | ACSAC Annual Computer Security Applications Conference |
Date Published | 12-7-2015 |
Publisher | ACM New York, NY, USA ©2015 |
Conference Location | Los Angeles, CA |
ISBN Number | 978-1-4503-3682-6 |
Keywords | CMU, Jan'16 |
Abstract | The ubiquitously-installed Java Runtime Environment (JRE) provides a complex, flexible set of mechanisms that support the execution of untrusted code inside a secure sandbox. However, many recent exploits have successfully escaped the sandbox, allowing attackers to infect numerous Java hosts. We hypothesize that the Java security model affords developers more flexibility than they need or use in practice, and thus its complexity compromises security without improving practical functionality. We describe an empirical study of the ways benign open-source Java applications use and interact with the Java security manager. We found that developers regularly misunderstand or misuse Java security mechanisms, that benign programs do not use all of the vast flexibility afforded by the Java security model, and that there are clear differences between the ways benign and exploit programs interact with the security manager. We validate these results by deriving two restrictions on application behavior that restrict (1) security manager modifications and (2) privilege escalation. We demonstrate that enforcing these rules at runtime stop a representative proportion of modern Java 7 exploits without breaking backwards compatibility with benign applications. These practical rules should be enforced in the JRE to fortify the Java sandbox. |
DOI | 10.1145/2818000.2818003 |
Citation Key | node-24909 |
Refereed Designation | Unknown |