Alexander Yip
Massachusetts Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Alexander Yip.
symposium on operating systems principles | 2007
Maxwell N. Krohn; Alexander Yip; Micah Z. Brodsky; Natan Cliffer; M. Frans Kaashoek; Eddie Kohler; Robert Tappan Morris
Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity, DIFC allows trusted code to protect untrusted software from unexpected malicious inputs. In either case, only bugs in the trusted code, which tends to be small and isolated, can lead to security violations. We present Flume, a new DIFC model that applies at the granularity of operating system processes and standard OS abstractions (e.g., pipes and file descriptors). Flume was designed for simplicity of mechanism, to ease DIFCs use in existing applications, and to allow safe interaction between conventional and DIFC-aware processes. Flume runs as a user-level reference monitor onLinux. A process confined by Flume cannot perform most system calls directly; instead, an interposition layer replaces system calls with IPCto the reference monitor, which enforces data flowpolicies and performs safe operations on the processs behalf. We ported a complex web application (MoinMoin Wiki) to Flume, changingonly 2% of the original code. Performance measurements show a 43% slowdown on read workloadsand a 34% slowdown on write workloads, which aremostly due to Flumes user-level implementation.
symposium on operating systems principles | 2009
Alexander Yip; Xi Wang; Nickolai Zeldovich; M. Frans Kaashoek
Resin is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. Resin provides policy objects, which programmers use to specify assertion code and metadata; data tracking, which allows programmers to associate assertions with application data, and to keep track of assertions as the data flow through the application; and filter objects, which programmers use to define data flow boundaries at which assertions are checked. Resins runtime checks data flow assertions by propagating policy objects along with data, as that data moves through the application, and then invoking filter objects when data crosses a data flow boundary, such as when writing data to the network or a file. Using Resin, Web application programmers can prevent a range of problems, from SQL injection and cross-site scripting, to inadvertent password disclosure and missing access control checks. Adding a Resin assertion to an application requires few changes to the existing application code, and an assertion can reuse existing code and data structures. For instance, 23 lines of code detect and prevent three previously-unknown missing access control vulnerabilities in phpBB, a popular Web forum application. Other assertions comprising tens of lines of code prevent a range of vulnerabilities in Python and PHP applications. A prototype of Resin incurs a 33% CPU overhead running the HotCRP conference management application.
networked systems design and implementation | 2014
Teemu Koponen; Keith E. Amidon; Peter J. Balland; Martin Casado; Anupam Chanda; Bryan J. Fulton; Igor Ganichev; Jesse E. Gross; Natasha Gude; Paul S. Ingram; Ethan J. Jackson; Andrew Lambeth; Romain F. Lenglet; Shih-Hao Li; Amar Padmanabhan; Justin Pettit; Ben Pfaff; Rajiv Ramanathan; Scott Shenker; Alan Shieh; Jeremy Stribling; Pankaj Thakkar; Dan Wendlandt; Alexander Yip; Ronghua Zhang
Archive | 2011
Teemu Koponen; Pankaj Thakkar; Martin Casado; W. Andrew Lambeth; Alexander Yip; Jeremy Stribling
Archive | 2011
Martin Casado; Teemu Koponen; Pankaj Thakkar; W. Andrew Lambeth; Alexander Yip; Keith E. Amidon; Paul S. Ingram
Archive | 2011
Martin Casado; Teemu Koponen; Pankaj Thakkar; W. Andrew Lambeth; Alexander Yip; Keith E. Amidon; Paul S. Ingram
usenix annual technical conference | 2003
Nickolai Zeldovich; Alexander Yip; Frank Dabek; Robert Tappan Morris; David Mazières; M. Frans Kaashoek
european conference on computer systems | 2009
Alexander Yip; Neha Narula; Maxwell N. Krohn; Robert Tappan Morris
HotNets | 2007
Micah Z. Brodsky; Maxwell N. Krohn; Robert Tappan Morris; Michael Walfish; Alexander Yip
Archive | 2012
Teemu Koponen; Pankaj Thakkar; Natasha Gude; W. Andrew Lambeth; Amar Padmanabhan; Alan Shieh; Jeremy Stribling; Alexander Yip; Ronghua Zhang; Martin Casado