Role Models: Role-based Debloating for Web Applications

Babak Amin Azad, Nick Nikiforakis
{"title":"Role Models: Role-based Debloating for Web Applications","authors":"Babak Amin Azad, Nick Nikiforakis","doi":"10.1145/3577923.3583647","DOIUrl":null,"url":null,"abstract":"The process of debloating, i.e., removing unnecessary code and features in software, has become an attractive proposition to managing the ever-expanding attack surface of ever-growing modern applications. Researchers have shown that debloating produces significant security improvements in a variety of application domains including operating systems, libraries, compiled software, and, more recently, web applications. Even though the client/server nature of web applications allows the same backend to serve thousands of users with diverse needs, web applications have been approached monolithically by existing debloating approaches. That is, a feature can be debloated only if none of the users of a web application requires it. Similarly, everyone gets access to the same \"global\" features, whether they need them or not. Recognizing that different users need access to different features, in this paper we propose role-based debloating for web applications. In this approach, we focus on clustering users with similar usage behavior together and providing them with a custom debloated application that is tailored to their needs. Through a user study with 60 experienced web developers and administrators, we first establish that different users indeed use web applications differently. This data is then used by DBLTR, an automated pipeline for providing tailored debloating based on a user's true requirements. Next to debloating web applications, DBLTR includes a transparent content-delivery mechanism that routes authenticated users to their debloated copies. We demonstrate that for different web applications, DBLTR can be 30-80% more effective than the state-of-the-art in debloating in removing critical vulnerabilities.","PeriodicalId":387479,"journal":{"name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3577923.3583647","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The process of debloating, i.e., removing unnecessary code and features in software, has become an attractive proposition to managing the ever-expanding attack surface of ever-growing modern applications. Researchers have shown that debloating produces significant security improvements in a variety of application domains including operating systems, libraries, compiled software, and, more recently, web applications. Even though the client/server nature of web applications allows the same backend to serve thousands of users with diverse needs, web applications have been approached monolithically by existing debloating approaches. That is, a feature can be debloated only if none of the users of a web application requires it. Similarly, everyone gets access to the same "global" features, whether they need them or not. Recognizing that different users need access to different features, in this paper we propose role-based debloating for web applications. In this approach, we focus on clustering users with similar usage behavior together and providing them with a custom debloated application that is tailored to their needs. Through a user study with 60 experienced web developers and administrators, we first establish that different users indeed use web applications differently. This data is then used by DBLTR, an automated pipeline for providing tailored debloating based on a user's true requirements. Next to debloating web applications, DBLTR includes a transparent content-delivery mechanism that routes authenticated users to their debloated copies. We demonstrate that for different web applications, DBLTR can be 30-80% more effective than the state-of-the-art in debloating in removing critical vulnerabilities.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
角色模型:Web应用程序的基于角色的讨论
对于管理不断增长的现代应用程序的不断扩大的攻击面来说,删除软件中不必要的代码和特性的过程已经成为一个有吸引力的提议。研究人员已经证明,在各种应用程序领域(包括操作系统、库、编译软件以及最近的web应用程序)中,消歧产生了显著的安全性改进。尽管web应用程序的客户机/服务器特性允许同一个后端为具有不同需求的数千个用户提供服务,但通过现有的扩展方法,web应用程序已经实现了单体化。也就是说,只有当web应用程序的所有用户都不需要某个特性时,才可以删除它。同样,每个人都可以访问相同的“全局”功能,无论他们是否需要它们。认识到不同的用户需要访问不同的功能,在本文中,我们提出了基于角色的web应用程序扩展。在这种方法中,我们专注于将具有相似使用行为的用户聚集在一起,并为他们提供根据他们的需求量身定制的扩展应用程序。通过对60名经验丰富的web开发人员和管理员的用户研究,我们首先确定不同的用户确实以不同的方式使用web应用程序。这些数据随后被DBLTR使用,DBLTR是一种自动化管道,可以根据用户的真实需求提供量身定制的充气。除了解压web应用程序之外,DBLTR还包括一个透明的内容传递机制,将经过身份验证的用户路由到解压后的副本。我们证明,对于不同的web应用程序,DBLTR在消除关键漏洞方面可以比最先进的技术高效30-80%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Tackling Credential Abuse Together Comparative Privacy Analysis of Mobile Browsers Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone Local Methods for Privacy Protection and Impact on Fairness Role Models: Role-based Debloating for Web Applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1