About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I

Research Article

mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party Libraries

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-64948-6_25,
        author={Yunming Zhang and Quanwei Cai and Houqiang Li and Jingqiang Lin and Wei Wang},
        title={mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party Libraries},
        proceedings={Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I},
        proceedings_a={SECURECOMM},
        year={2024},
        month={10},
        keywords={Memory Disclosure Memory encryption Intel SGX Isolation},
        doi={10.1007/978-3-031-64948-6_25}
    }
    
  • Yunming Zhang
    Quanwei Cai
    Houqiang Li
    Jingqiang Lin
    Wei Wang
    Year: 2024
    mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party Libraries
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-64948-6_25
Yunming Zhang1, Quanwei Cai2, Houqiang Li1, Jingqiang Lin1,*, Wei Wang3
  • 1: University of Science and Technology of China, Hefei
  • 2: Beijing Zitiao Network Technology Co., Ltd.
  • 3: State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
*Contact email: linjq@ustc.edu.cn

Abstract

Third-party libraries (TPLs) are widely adopted in softwares for integrating special functions (e.g., compression) efficiently. However, as most TPLs are in the same process with the invoker, attackers could exploit memory disclosure vulnerabilities in TPLs to read the sensitive memory data of the victim process. Therefore, once a vulnerability found in a TPL, all softwares with this TPL need to be patched in time, which is impractical. In this paper, we propose a cryptography-based isolation (namedmShield) between the data memory of the invoker and TPLs, to prevent TPL vulnerabilities from being exploited to read the invoker’s sensitive memory data. mShield performs a user-mode and lightweight memory analysis, figures out the invoker’s memory space (including stack, heap, user-defined ones in BSS/data segment), encrypts them before invoking any TPL function, and automatically decrypts them once the function returns, without interrupting the normal execution. mShield performs the encryption/decryption in the trusted environment provided by Intel SGX, which prevents the attacker from reading the cryptographic key, and alerts (i.e., the invoker’s decryption fails) in time once the encryption context is tampered with (e.g., by illegal invocations of decryption). We have implemented mShield, and adopted it to protect Nginx against a potentially vulnerable TPL (i.e., zlib). The experiment demonstrates mShield’s effectiveness (TPLs fail to read the invoker’s plaintext sensitive memory data) and acceptable efficiency (about less than 4(\times )time cost).

Keywords
Memory Disclosure Memory encryption Intel SGX Isolation
Published
2024-10-13
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-64948-6_25
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL