Skip to main content
Top
Published in: Annals of Telecommunications 7-8/2023

17-04-2023

A modular pipeline for enforcement of security properties at runtime

Authors: Rania Taleb, Sylvain Hallé, Raphaël Khoury

Published in: Annals of Telecommunications | Issue 7-8/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Runtime enforcement ensures the respect of a user-specified security policy by a program by providing a valid replacement for any misbehaving sequence of events that may occur during that program’s execution. However, depending on the capabilities of the enforcement mechanism, multiple possible replacement sequences may be available, and the current literature is silent on the question of how to choose the optimal one. Furthermore, the current design of runtime monitors imposes a substantial burden on the designer, since the entirety of the monitoring task is accomplished by a monolithic construct, usually an automata-based model. In this paper, we propose a new modular model of enforcement monitors, in which the tasks of altering the execution, ensuring compliance with the security policy, and selecting the optimal replacement are split into three separate modules, which simplifies the creation of runtime monitors. We implement this approach by using the event stream processor BeepBeep and a use case is presented. Experimental evaluation shows that our proposed framework can dynamically select an adequate enforcement actions at runtime, without the need to manually define an enforcement monitor.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
When used as a proxy in our enforcement pipeline, the Mealy machine of Fig. 19 does not create this issue, as on the second c+ input event, control is not switched to the enforcement pipeline as no violation is detected.
 
Literature
1.
go back to reference Ancona D, Dagnino F, Franceschini L (2018) A formalism for specification of java API interfaces. In: Dolby J, Halfond WGJ, Mishra A (eds) Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ISSTA 2018, Amsterdam, Netherlands, July 16-21, 2018. ACM, pp 24–26. https://doi.org/10.1145/3236454.3236476 Ancona D, Dagnino F, Franceschini L (2018) A formalism for specification of java API interfaces. In: Dolby J, Halfond WGJ, Mishra A (eds) Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ISSTA 2018, Amsterdam, Netherlands, July 16-21, 2018. ACM, pp 24–26. https://​doi.​org/​10.​1145/​3236454.​3236476
4.
go back to reference Bartocci E, Falcone Y, Francalanza A et al (2018) Introduction to runtime verification. In: Bartocci E, Falcone Y (eds) Lectures on runtime verification - introductory and advanced topics, Lecture Notes in Computer Science, vol 10457. Springer, pp 1–33. https://doi.org/10.1007/978-3-319-75632-5_1 Bartocci E, Falcone Y, Francalanza A et al (2018) Introduction to runtime verification. In: Bartocci E, Falcone Y (eds) Lectures on runtime verification - introductory and advanced topics, Lecture Notes in Computer Science, vol 10457. Springer, pp 1–33. https://​doi.​org/​10.​1007/​978-3-319-75632-5_​1
6.
go back to reference Bauer A, Leucker M, Schallhart C (2006) Monitoring of real-time properties. In: Arun-Kumar S, Garg N (eds) FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, Kolkata, India, December 13-15, 2006, Proceedings, Lecture Notes in Computer Science, vol 4337. Springer, pp 260–272. https://doi.org/10.1007/11944836_25 Bauer A, Leucker M, Schallhart C (2006) Monitoring of real-time properties. In: Arun-Kumar S, Garg N (eds) FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, Kolkata, India, December 13-15, 2006, Proceedings, Lecture Notes in Computer Science, vol 4337. Springer, pp 260–272. https://​doi.​org/​10.​1007/​11944836_​25
7.
go back to reference Bauer A, Leucker M, Schallhart C (2007) The good, the bad, and the ugly, but how ugly is ugly? In: Sokolsky O, Tasiran S (eds) Runtime Verification, 7th International Workshop, RV 2007, Vancouver, Canada, March 13, 2007, Revised Selected Papers, Lecture Notes in Computer Science, vol 4839. Springer, pp 126–138. https://doi.org/10.1007/978-3-540-77395-5_11 Bauer A, Leucker M, Schallhart C (2007) The good, the bad, and the ugly, but how ugly is ugly? In: Sokolsky O, Tasiran S (eds) Runtime Verification, 7th International Workshop, RV 2007, Vancouver, Canada, March 13, 2007, Revised Selected Papers, Lecture Notes in Computer Science, vol 4839. Springer, pp 126–138. https://​doi.​org/​10.​1007/​978-3-540-77395-5_​11
10.
go back to reference Bauer L, Ligatti J, Walker D (2002) More enforceable security policies. In: In foundations of computer security Bauer L, Ligatti J, Walker D (2002) More enforceable security policies. In: In foundations of computer security
11.
go back to reference Beauquier D, Cohen J, Lanotte R (2013) Security policies enforcement using finite and pushdown edit automata. Int J Inf Sec 12(4):319–336CrossRefMATH Beauquier D, Cohen J, Lanotte R (2013) Security policies enforcement using finite and pushdown edit automata. Int J Inf Sec 12(4):319–336CrossRefMATH
12.
go back to reference Betti Q, Montreuil B, Khoury R et al (2020) Smart contracts-enabled simulation for hyperconnected logistics. Springer International Publishing, Cham, pp 109–149 Betti Q, Montreuil B, Khoury R et al (2020) Smart contracts-enabled simulation for hyperconnected logistics. Springer International Publishing, Cham, pp 109–149
14.
go back to reference Bielova N, Massacci F (2011b) Do you really mean what you actually enforced? – edited automata revisited. Int J Inf Sec 10(4):239–254CrossRef Bielova N, Massacci F (2011b) Do you really mean what you actually enforced? – edited automata revisited. Int J Inf Sec 10(4):239–254CrossRef
15.
go back to reference Bielova N, Massacci F (2012) Iterative enforcement by suppression: towards practical enforcement theories. J Comput Secur 20(1) Bielova N, Massacci F (2012) Iterative enforcement by suppression: towards practical enforcement theories. J Comput Secur 20(1)
17.
go back to reference Boussaha MR, Khoury R, Hallé S (2017) Monitoring of security properties using BeepBeep. In: Imine A, Fernandez JM, Marion J et al (eds) Foundations and Practice of Security – 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers, Lecture Notes in Computer Science, vol 10723. Springer, pp 160–169. https://doi.org/10.1007/978-3-319-75650-9_11 Boussaha MR, Khoury R, Hallé S (2017) Monitoring of security properties using BeepBeep. In: Imine A, Fernandez JM, Marion J et al (eds) Foundations and Practice of Security – 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers, Lecture Notes in Computer Science, vol 10723. Springer, pp 160–169. https://​doi.​org/​10.​1007/​978-3-319-75650-9_​11
18.
go back to reference Chabot H, Khoury R, Tawbi N (2011) Extending the enforcement power of truncation monitors using static analysis. pp 194–207 Chabot H, Khoury R, Tawbi N (2011) Extending the enforcement power of truncation monitors using static analysis. pp 194–207
19.
go back to reference Chang E, Manna Z, Pnueli A (1993) The safety-progress classification. In: Bauer FL, Brauer W, Schwichtenberg H (eds) Logic and algebra of specification. Springer, Berlin, pp 143–202 Chang E, Manna Z, Pnueli A (1993) The safety-progress classification. In: Bauer FL, Brauer W, Schwichtenberg H (eds) Logic and algebra of specification. Springer, Berlin, pp 143–202
20.
go back to reference Chen F, Meredith PO, Jin D et al (2009) Efficient formalism-independent monitoring of parametric properties. In: ASE. IEEE Computer Society, pp 383–394 Chen F, Meredith PO, Jin D et al (2009) Efficient formalism-independent monitoring of parametric properties. In: ASE. IEEE Computer Society, pp 383–394
21.
go back to reference Colombo C, Pace GJ, Schneider G (2009) LARVA—safer monitoring of real-time java programs (tool paper). In: Hung DV, Krishnan P (eds) 7th IEEE international conference on software engineering and formal methods, SEFM 2009, Hanoi, Vietnam, 23–27 November 2009. IEEE Computer Society, pp 33–37. https://doi.org/10.1109/SEFM.2009.13 Colombo C, Pace GJ, Schneider G (2009) LARVA—safer monitoring of real-time java programs (tool paper). In: Hung DV, Krishnan P (eds) 7th IEEE international conference on software engineering and formal methods, SEFM 2009, Hanoi, Vietnam, 23–27 November 2009. IEEE Computer Society, pp 33–37. https://​doi.​org/​10.​1109/​SEFM.​2009.​13
22.
go back to reference Colombo C, Ellul J, Pace GJ (2018) Contracts over smart contracts: recovering from violations dynamically. In: Margaria T, Steffen B (eds) ISoLA 2018, LNCS, vol 11247. Springer, pp 300–315 Colombo C, Ellul J, Pace GJ (2018) Contracts over smart contracts: recovering from violations dynamically. In: Margaria T, Steffen B (eds) ISoLA 2018, LNCS, vol 11247. Springer, pp 300–315
23.
go back to reference Convent L, Hungerecker S, Leucker M, etal (2018) TeSSLa: Temporal stream-based specification language. In: Massoni T, Mousavi MR (eds) Formal methods: foundations and applications - 21st Brazilian Symposium, SBMF 2018, Salvador, Brazil, November 26–30, 2018, Proceedings, Lecture Notes in Computer Science, vol 11254. Springer, pp 144–162. https://doi.org/10.1007/978-3-030-03044-5_10 Convent L, Hungerecker S, Leucker M, etal (2018) TeSSLa: Temporal stream-based specification language. In: Massoni T, Mousavi MR (eds) Formal methods: foundations and applications - 21st Brazilian Symposium, SBMF 2018, Salvador, Brazil, November 26–30, 2018, Proceedings, Lecture Notes in Computer Science, vol 11254. Springer, pp 144–162. https://​doi.​org/​10.​1007/​978-3-030-03044-5_​10
24.
go back to reference D’Angelo B, Sankaranarayanan S, Sánchez C et al (2005) LOLA: runtime monitoring of synchronous systems. In: TIME. IEEE Computer Society, pp 166–174 D’Angelo B, Sankaranarayanan S, Sánchez C et al (2005) LOLA: runtime monitoring of synchronous systems. In: TIME. IEEE Computer Society, pp 166–174
26.
go back to reference Dolzhenko E, Ligatti J, Reddy S (2015b) Modeling runtime enforcement with mandatory results automata. Int J Inf Secur 14(1):47–60CrossRef Dolzhenko E, Ligatti J, Reddy S (2015b) Modeling runtime enforcement with mandatory results automata. Int J Inf Secur 14(1):47–60CrossRef
27.
go back to reference Drábik P, Martinelli F, Morisset C (2012a) Cost-aware runtime enforcement of security policies. In: Jøsang A, Samarati P, Petrocchi M (eds) STM, LNCS, vol 7783. Springer, pp 1–16 Drábik P, Martinelli F, Morisset C (2012a) Cost-aware runtime enforcement of security policies. In: Jøsang A, Samarati P, Petrocchi M (eds) STM, LNCS, vol 7783. Springer, pp 1–16
28.
go back to reference Drábik P, Martinelli F, Morisset C (2012b) A quantitative approach for inexact enforcement of security policies. In: Gollmann D, Freiling FC (eds) ISC 2012, LNCS, vol 7483. Springer, pp 306–321 Drábik P, Martinelli F, Morisset C (2012b) A quantitative approach for inexact enforcement of security policies. In: Gollmann D, Freiling FC (eds) ISC 2012, LNCS, vol 7483. Springer, pp 306–321
29.
go back to reference Erlingsson U (2004) The inlined reference monitor approach to security policy enforcement. PhD thesis, USA, aAI3114521 Erlingsson U (2004) The inlined reference monitor approach to security policy enforcement. PhD thesis, USA, aAI3114521
30.
go back to reference Falcone Y, Salaün G (2021) Runtime enforcement with reordering, healing, and suppression. In: Calinescu R, Pasareanu CS (eds) Software Engineering and Formal Methods - 19th International Conference, SEFM 2021, Virtual Event, December 6-10, 2021, Proceedings, Lecture Notes in Computer Science, vol 13085. Springer, pp 47–65. https://doi.org/10.1007/978-3-030-92124-8_3 Falcone Y, Salaün G (2021) Runtime enforcement with reordering, healing, and suppression. In: Calinescu R, Pasareanu CS (eds) Software Engineering and Formal Methods - 19th International Conference, SEFM 2021, Virtual Event, December 6-10, 2021, Proceedings, Lecture Notes in Computer Science, vol 13085. Springer, pp 47–65. https://​doi.​org/​10.​1007/​978-3-030-92124-8_​3
31.
go back to reference Falcone Y, Mounier L, Fernandez JC et al (2011) Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Form Methods Syst Des 38(3):223–262CrossRefMATH Falcone Y, Mounier L, Fernandez JC et al (2011) Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Form Methods Syst Des 38(3):223–262CrossRefMATH
33.
go back to reference Falcone Y, Mariani L, Rollet A et al (2018) Runtime failure prevention and reaction. In: Bartocci E, Falcone Y (eds) Lectures on runtime verification – introductory and advanced topics, LNCS, vol 10457. Springer, pp 103–134 Falcone Y, Mariani L, Rollet A et al (2018) Runtime failure prevention and reaction. In: Bartocci E, Falcone Y (eds) Lectures on runtime verification – introductory and advanced topics, LNCS, vol 10457. Springer, pp 103–134
34.
go back to reference Fong PWL (2004) Access control by tracking shallow execution history. In: S&P 2004. IEEE Computer Society, pp 43–55 Fong PWL (2004) Access control by tracking shallow execution history. In: S&P 2004. IEEE Computer Society, pp 43–55
36.
go back to reference Hallé S, Khoury R (2017) Event stream processing with beepbeep 3. In: Reger G, Havelund K (eds) RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, September 15, 2017, Seattle, WA, USA, Kalpa Publications in Computing, vol 3. EasyChair, pp 81–88. https://doi.org/10.29007/4cth Hallé S, Khoury R (2017) Event stream processing with beepbeep 3. In: Reger G, Havelund K (eds) RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, September 15, 2017, Seattle, WA, USA, Kalpa Publications in Computing, vol 3. EasyChair, pp 81–88. https://​doi.​org/​10.​29007/​4cth
38.
go back to reference Hallé S, Gaboury S, Bouchard B (2016) Activity recognition through complex event processing: first findings. In: Bouchard B, Giroux S, Bouzouane A et al (eds) Artificial intelligence applied to assistive technologies and smart environments, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016, AAAI Technical Report, vol WS-16-01. AAAI Press. http://www.aaai.org/ocs/index.php/WS/AAAIW16/paper/view/12561 Hallé S, Gaboury S, Bouchard B (2016) Activity recognition through complex event processing: first findings. In: Bouchard B, Giroux S, Bouzouane A et al (eds) Artificial intelligence applied to assistive technologies and smart environments, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016, AAAI Technical Report, vol WS-16-01. AAAI Press. http://​www.​aaai.​org/​ocs/​index.​php/​WS/​AAAIW16/​paper/​view/​12561
40.
go back to reference Hallé S (2018) Event stream processing with BeepBeep 3: log crunching and analysis made easy. Presses de l’Université du Québec Hallé S (2018) Event stream processing with BeepBeep 3: log crunching and analysis made easy. Presses de l’Université du Québec
42.
go back to reference Hamlen KW, Morrisett JG, Schneider FB (2006a) Computability classes for enforcement mechanisms. ACM Trans Program Lang Syst 28(1):175–205CrossRef Hamlen KW, Morrisett JG, Schneider FB (2006a) Computability classes for enforcement mechanisms. ACM Trans Program Lang Syst 28(1):175–205CrossRef
46.
go back to reference Khoury R, Hallé S (2015a) Runtime enforcement with partial control. In: García-Alfaro J, Kranakis E, Bonfante G (eds) FPS 2015, LNCS, vol 9482. Springer, pp 102–116 Khoury R, Hallé S (2015a) Runtime enforcement with partial control. In: García-Alfaro J, Kranakis E, Bonfante G (eds) FPS 2015, LNCS, vol 9482. Springer, pp 102–116
47.
go back to reference Khoury R, Hallé S (2015b) Runtime enforcement with partial control. In: García-Alfaro J, Kranakis E, Bonfante G (eds) Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers, Lecture Notes in Computer Science, vol 9482. Springer, pp 102–116. https://doi.org/10.1007/978-3-319-30303-1_7 Khoury R, Hallé S (2015b) Runtime enforcement with partial control. In: García-Alfaro J, Kranakis E, Bonfante G (eds) Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers, Lecture Notes in Computer Science, vol 9482. Springer, pp 102–116. https://​doi.​org/​10.​1007/​978-3-319-30303-1_​7
48.
go back to reference Khoury R, Hallé S (2018) Tally keeping-LTL: an LTL semantics for quantitative evaluation of LTL specifications. In: IRI 2018. IEEE, pp 495–502 Khoury R, Hallé S (2018) Tally keeping-LTL: an LTL semantics for quantitative evaluation of LTL specifications. In: IRI 2018. IEEE, pp 495–502
49.
go back to reference Khoury R, Tawbi N (2012a) Corrective enforcement: a new paradigm of security policy enforcement by monitors. ACM Trans Inf Syst Secur 15(2):10CrossRef Khoury R, Tawbi N (2012a) Corrective enforcement: a new paradigm of security policy enforcement by monitors. ACM Trans Inf Syst Secur 15(2):10CrossRef
50.
go back to reference Khoury R, Tawbi N (2012b) Which security policies are enforceable by runtime monitors? A survey. Comput Sci Rev 6(1):27–45CrossRefMATH Khoury R, Tawbi N (2012b) Which security policies are enforceable by runtime monitors? A survey. Comput Sci Rev 6(1):27–45CrossRefMATH
51.
go back to reference Khoury R, Hallé S, Waldmann O (2016) Execution trace analysis using LTL-FO ˆ+. In: Margaria T, Steffen B (eds) Leveraging applications of formal methods, verification and validation: discussion, dissemination, applications - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II, pp 356–362. https://doi.org/10.1007/978-3-319-47169-3_26 Khoury R, Hallé S, Waldmann O (2016) Execution trace analysis using LTL-FO ˆ+. In: Margaria T, Steffen B (eds) Leveraging applications of formal methods, verification and validation: discussion, dissemination, applications - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II, pp 356–362. https://​doi.​org/​10.​1007/​978-3-319-47169-3_​26
52.
go back to reference Kiczales G, Lamping J, Mendhekar A et al (1997) Aspect-oriented programming. In: European conference on object-oriented programming. Springer, pp 220–242 Kiczales G, Lamping J, Mendhekar A et al (1997) Aspect-oriented programming. In: European conference on object-oriented programming. Springer, pp 220–242
54.
go back to reference Legunsen O, Marinov D, Rosu G (2015) Evolution-aware monitoring-oriented programming. In: Bertolino A, Canfora G, Elbaum S G (eds) 37th IEEE/ACM international conference on software engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, vol 2. IEEE Computer Society, pp 615–618. https://doi.org/10.1109/ICSE.2015.206 Legunsen O, Marinov D, Rosu G (2015) Evolution-aware monitoring-oriented programming. In: Bertolino A, Canfora G, Elbaum S G (eds) 37th IEEE/ACM international conference on software engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, vol 2. IEEE Computer Society, pp 615–618. https://​doi.​org/​10.​1109/​ICSE.​2015.​206
56.
go back to reference Manna Z, Pnueli A (1995) Temporal verification of reactive systems - safety. Springer, BerlinCrossRefMATH Manna Z, Pnueli A (1995) Temporal verification of reactive systems - safety. Springer, BerlinCrossRefMATH
58.
go back to reference Pace GJ, Pardo R, Schneider G (2016) On the runtime enforcement of evolving privacy policies in online social networks. In: Margaria T, Steffen B (eds) Leveraging applications of formal methods, verification and validation: discussion, dissemination, applications - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II, pp 407–412. https://doi.org/10.1007/978-3-319-47169-3_33 Pace GJ, Pardo R, Schneider G (2016) On the runtime enforcement of evolving privacy policies in online social networks. In: Margaria T, Steffen B (eds) Leveraging applications of formal methods, verification and validation: discussion, dissemination, applications - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part II, pp 407–412. https://​doi.​org/​10.​1007/​978-3-319-47169-3_​33
59.
go back to reference Pinisetty S, Falcone Y, Jéron T et al (2013) Runtime enforcement of timed properties. In: Qadeer S, Tasiran S (eds) Runtime verification. Springer, Berlin, pp 229–244 Pinisetty S, Falcone Y, Jéron T et al (2013) Runtime enforcement of timed properties. In: Qadeer S, Tasiran S (eds) Runtime verification. Springer, Berlin, pp 229–244
62.
go back to reference Reger G, Cruz HC, Rydeheard DE (2015) MarQ: monitoring at runtime with QEA. In: Baier C, Tinelli C (eds) TACAS 2015, LNCS, vol 9035. Springer, pp 596–610 Reger G, Cruz HC, Rydeheard DE (2015) MarQ: monitoring at runtime with QEA. In: Baier C, Tinelli C (eds) TACAS 2015, LNCS, vol 9035. Springer, pp 596–610
63.
go back to reference Roudjane M, Rebaine D, Khoury R et al (2019) Predictive analytics for event stream processing. In: 23rd IEEE international enterprise distributed object computing conference, EDOC 2019, Paris, France, October 28-31, 2019. IEEE, pp 171–182. https://doi.org/10.1109/EDOC.2019.00029 Roudjane M, Rebaine D, Khoury R et al (2019) Predictive analytics for event stream processing. In: 23rd IEEE international enterprise distributed object computing conference, EDOC 2019, Paris, France, October 28-31, 2019. IEEE, pp 171–182. https://​doi.​org/​10.​1109/​EDOC.​2019.​00029
64.
go back to reference Schneider FB (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3(1):30–50CrossRef Schneider FB (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3(1):30–50CrossRef
65.
go back to reference Selyunin K, Jaksic S, Nguyen T et al (2017) Runtime monitoring with recovery of the sent communication protocol. In: Majumdar R, Kunčak V (eds) Computer aided verification. Springer International Publishing, Cham, pp 336–355 Selyunin K, Jaksic S, Nguyen T et al (2017) Runtime monitoring with recovery of the sent communication protocol. In: Majumdar R, Kunčak V (eds) Computer aided verification. Springer International Publishing, Cham, pp 336–355
66.
go back to reference Taleb R, Hallé S, Khoury R (2021a) A modular runtime enforcement model using multi-traces. In: Aïmeur E, Laurent M, Yaich R et al (eds) Foundations and practice of security - 14th international symposium, FPS 2021, Paris, France, December 7-10, 2021, Revised Selected Papers, Lecture Notes in Computer Science, vol 13291. Springer, pp 283–302. https://doi.org/10.1007/978-3-031-08147-7_19 Taleb R, Hallé S, Khoury R (2021a) A modular runtime enforcement model using multi-traces. In: Aïmeur E, Laurent M, Yaich R et al (eds) Foundations and practice of security - 14th international symposium, FPS 2021, Paris, France, December 7-10, 2021, Revised Selected Papers, Lecture Notes in Computer Science, vol 13291. Springer, pp 283–302. https://​doi.​org/​10.​1007/​978-3-031-08147-7_​19
69.
go back to reference Talhi C, Tawbi N, Debbabi M (2006) Execution monitoring enforcement for limited-memory systems. In: PST, PST ’06. Association for Computing Machinery, New York Talhi C, Tawbi N, Debbabi M (2006) Execution monitoring enforcement for limited-memory systems. In: PST, PST ’06. Association for Computing Machinery, New York
71.
go back to reference Vella M, Colombo C, Abela R et al (2021) RV-TEE: secure cryptographic protocol execution based on runtime verification. J Comput Virol Hacking Tech 17:229–248CrossRef Vella M, Colombo C, Abela R et al (2021) RV-TEE: secure cryptographic protocol execution based on runtime verification. J Comput Virol Hacking Tech 17:229–248CrossRef
Metadata
Title
A modular pipeline for enforcement of security properties at runtime
Authors
Rania Taleb
Sylvain Hallé
Raphaël Khoury
Publication date
17-04-2023
Publisher
Springer International Publishing
Published in
Annals of Telecommunications / Issue 7-8/2023
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-023-00952-z

Other articles of this Issue 7-8/2023

Annals of Telecommunications 7-8/2023 Go to the issue