We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR
new | recent | 1510

Change to browse by:

cs

References & Citations

Computer Science > Cryptography and Security

Title:Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis

Abstract: Clustering software into peer groups based on its apparent functionality allows for simple, intuitive categorization of software that can, in particular, help identify which software uses comparatively more privilege than is necessary to implement its functionality. Such relative comparison can improve the security of a software ecosystem in a number of ways. For example, it can allow market operators to incentivize software developers to adhere to the principle of least privilege, e.g., by encouraging users to use alternative, less-privileged applications for any desired functionality. This paper introduces software peer group analysis, a novel technique to identify least privilege violation and rank software based on the severity of the violation. We show that peer group analysis is an effective tool for detecting and estimating the severity of least privilege violation. It provides intuitive, meaningful results, even across different definitions of peer groups and security-relevant privileges. Our evaluation is based on empirically applying our analysis to over a million software items, in two different online software markets, and on a validation of our assumptions in a medium-scale user study.
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:1510.07308 [cs.CR]
  (or arXiv:1510.07308v1 [cs.CR] for this version)

Submission history

From: Suman Jana [view email]
[v1] Sun, 25 Oct 2015 21:14:06 UTC (423 KB)