Privilege separation made easy Trusting small libraries not big processes Derek G. Murray Steven Hand University of Cambridge Computer Laboratory University of Cambridge Computer Laboratory Cambridge, United Kingdom Cambridge, United Kingdom
[email protected] [email protected] ABSTRACT practices” for security. Therefore, we present a new ap- At the heart of a secure software system is a small, trustwor- proach, based on the well-understood and commonly-used thy component, called the Trusted Computing Base (TCB). concept of dynamic libraries. However, developers persist in building monolithic systems Several researchers have discussed the problem of divid- that force their users to trust the entire system. We posit ing a monolithic piece of software into several smaller pieces, that this is due to the lack of a straightforward mechanism of each of which runs with the least necessary privilege. Disag- partitioning – or disaggregating – systems into trusted and gregation [16], partitioning [8], privilege separation [17] and untrusted components. We propose to use dynamic libraries TCB-reduction [13, 21] are simply different names for the as the unit of disaggregation, because these are a familiar process of dividing software into a small trusted computing abstraction, which is commonly used in mainstream software base (TCB), and a larger untrusted part. However, existing development. solutions to this problem either use ad hoc techniques or In this paper, we present our early ideas on the disag- source code annotation to split the code. gregated library approach, which can be applied to existing Dynamic libraries – i.e. collections of executable code and applications that run on commodity operating systems.