Skip to main content
Erschienen in: International Journal of Information Security 1/2015

01.02.2015 | Regular Contribution

Modeling runtime enforcement with mandatory results automata

verfasst von: Egor Dolzhenko, Jay Ligatti, Srikar Reddy

Erschienen in: International Journal of Information Security | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents a theory of runtime enforcement based on mechanism models called mandatory results automata (MRAs). MRAs can monitor and transform security-relevant actions and their results. The operational semantics of MRAs is simple and enables straightforward definitions of concrete MRAs. Moreover, the definitions of policies and enforcement with MRAs are simple and expressive. Putting all of these features together, we argue that MRAs make good general models of runtime mechanisms, upon which a theory of runtime enforcement can be based. We develop some enforceability theory by characterizing the policies deterministic and non-deterministic MRAs can and cannot enforce.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Aktug, I., Dam, M., Gurov, D.: Provably correct runtime monitoring. In: Proceedings of the 15th International Symposium on Formal Methods, May 2008 Aktug, I., Dam, M., Gurov, D.: Provably correct runtime monitoring. In: Proceedings of the 15th International Symposium on Formal Methods, May 2008
2.
Zurück zum Zitat Alpern, B., Schneider, F.B.: Defining liveness. Inf. Process. Lett. 21(4), 181–185 (Oct. 1985) Alpern, B., Schneider, F.B.: Defining liveness. Inf. Process. Lett. 21(4), 181–185 (Oct. 1985)
3.
Zurück zum Zitat Basin, D., Jugé, V., Klaedtke, F., Zălinescu, E.: Enforceable security policies revisited. ACM Trans. Inf. Syst. Secur. 16(1) 3:1–3:26 (2013) Basin, D., Jugé, V., Klaedtke, F., Zălinescu, E.: Enforceable security policies revisited. ACM Trans. Inf. Syst. Secur. 16(1) 3:1–3:26 (2013)
4.
Zurück zum Zitat Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (2005) Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (2005)
5.
Zurück zum Zitat Bauer, L., Ligatti, J., Walker, D.: Composing expressive runtime security policies. ACM Trans. Softw. Eng. Methodol. 18(3), 1–43 (2009)CrossRef Bauer, L., Ligatti, J., Walker, D.: Composing expressive runtime security policies. ACM Trans. Softw. Eng. Methodol. 18(3), 1–43 (2009)CrossRef
6.
Zurück zum Zitat Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite edit automata. Electron. Notes Theor. Comput. Sci. 229(3), 19–35 (2009)CrossRefMathSciNet Beauquier, D., Cohen, J., Lanotte, R.: Security policies enforcement using finite edit automata. Electron. Notes Theor. Comput. Sci. 229(3), 19–35 (2009)CrossRefMathSciNet
7.
Zurück zum Zitat Bielova, N., Massacci, F.: Predictability of enforcement. In: Proceedings of the International Symposium on Engineering Secure Software and Systems, vol. 6542, pp. 73–86. Springer (2011) Bielova, N., Massacci, F.: Predictability of enforcement. In: Proceedings of the International Symposium on Engineering Secure Software and Systems, vol. 6542, pp. 73–86. Springer (2011)
8.
Zurück zum Zitat Bielova, N., Massacci, F.: Iterative enforcement by suppression: towards practical enforcement theories. J. Comput. Secur. 20(1), 51–79 (2012) Bielova, N., Massacci, F.: Iterative enforcement by suppression: towards practical enforcement theories. J. Comput. Secur. 20(1), 51–79 (2012)
9.
Zurück zum Zitat Biskup, J.: Security in Computing Systems: Challenges, Approaches and Solutions. Springer, Berlin (2009) Biskup, J.: Security in Computing Systems: Challenges, Approaches and Solutions. Springer, Berlin (2009)
10.
Zurück zum Zitat Dam, M., Jacobs, B., Lundblad, A., Piessens, F.: Security monitor inlining for multithreaded java. In: Proceedings of the European Conference on Object-Oriented Programming (ECOOP), July 2009 Dam, M., Jacobs, B., Lundblad, A., Piessens, F.: Security monitor inlining for multithreaded java. In: Proceedings of the European Conference on Object-Oriented Programming (ECOOP), July 2009
11.
Zurück zum Zitat Devriese, D., Piessens, F.: Non-interference through secure multi-execution. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 109–124, May 2010 Devriese, D., Piessens, F.: Non-interference through secure multi-execution. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 109–124, May 2010
12.
Zurück zum Zitat Erlingsson, Ú.: The inlined reference monitor approach to security policy enforcement. Ph.D. thesis, Cornell University, Jan. 2004 Erlingsson, Ú.: The inlined reference monitor approach to security policy enforcement. Ph.D. thesis, Cornell University, Jan. 2004
13.
Zurück zum Zitat Finnis, J., Saigal, N., Iamnitchi, A., Ligatti, J.: A location-based policy-specification language for mobile devices. Pervasive Mob. Comput. J. 8(3), 402–414 (June 2012) Finnis, J., Saigal, N., Iamnitchi, A., Ligatti, J.: A location-based policy-specification language for mobile devices. Pervasive Mob. Comput. J. 8(3), 402–414 (June 2012)
14.
Zurück zum Zitat Fong, P.W.L.: Access control by tracking shallow execution history. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2004 Fong, P.W.L.: Access control by tracking shallow execution history. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2004
15.
Zurück zum Zitat Hamlen, K., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Progr. Lang. Syst. 28(1), 175–205 (Jan. 2006) Hamlen, K., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Progr. Lang. Syst. 28(1), 175–205 (Jan. 2006)
16.
Zurück zum Zitat Khoury, R., Tawbi, N.: Corrective enforcement of security policies. In: Pierpaolo, D., Sandro, E., Joshua, G.(eds.) Formal Aspects of Security and Trust, Lecture Notes in Computer Science, vol. 6561, pp. 176–190. Springer Berlin, Heidelberg (2011). doi:10.1007/978-3-64219751-2_12 Khoury, R., Tawbi, N.: Corrective enforcement of security policies. In: Pierpaolo, D., Sandro, E., Joshua, G.(eds.) Formal Aspects of Security and Trust, Lecture Notes in Computer Science, vol. 6561, pp. 176–190. Springer Berlin, Heidelberg (2011). doi:10.​1007/​978-3-64219751-2_​12
17.
Zurück zum Zitat Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.: An overview of AspectJ. In: European Conference on Object-oriented Programming. Springer (2001) Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.: An overview of AspectJ. In: European Conference on Object-oriented Programming. Springer (2001)
18.
Zurück zum Zitat Kim, M., Kannan, S., Lee, I., Sokolsky, O., Viswantathan M.: Computational analysis of run-time monitoring: fundamentals of Java-MaC Electron. Notes Theor. Comput. Sci. 70(4), 80–94 (2002). doi:10.1016/S1571-0661(04)80578-4 Kim, M., Kannan, S., Lee, I., Sokolsky, O., Viswantathan M.: Computational analysis of run-time monitoring: fundamentals of Java-MaC Electron. Notes Theor. Comput. Sci. 70(4), 80–94 (2002). doi:10.​1016/​S1571-0661(04)80578-4
19.
Zurück zum Zitat Lamport, L.: Logical foundation. In: Lecture Notes in Computer Science, vol. 190, pp. 119–130 (1985) Lamport, L.: Logical foundation. In: Lecture Notes in Computer Science, vol. 190, pp. 119–130 (1985)
20.
Zurück zum Zitat Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1–41 (Jan. 2009) Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Inf. Syst. Secur. 12(3), 1–41 (Jan. 2009)
21.
Zurück zum Zitat Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS), Sept. 2010 Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS), Sept. 2010
22.
Zurück zum Zitat Pretschner, A., Buechler, M., Harvan, M., Schaefer, C., Walter, T.: Usage control enforcement with data flow tracking for x11. In: Proceedings of 5th International Workshop on Security and Trust Management, pp. 124–137 (2009) Pretschner, A., Buechler, M., Harvan, M., Schaefer, C., Walter, T.: Usage control enforcement with data flow tracking for x11. In: Proceedings of 5th International Workshop on Security and Trust Management, pp. 124–137 (2009)
23.
Zurück zum Zitat Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for usage control. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (2008) Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for usage control. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (2008)
24.
Zurück zum Zitat Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)CrossRef Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)CrossRef
25.
Zurück zum Zitat Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2–4), 158–184 (2008)CrossRefMATHMathSciNet Talhi, C., Tawbi, N., Debbabi, M.: Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2–4), 158–184 (2008)CrossRefMATHMathSciNet
26.
Zurück zum Zitat Viswanathan, M.: Foundations for the run-time analysis of software systems. Ph.D. thesis, University of Pennsylvania (2000) Viswanathan, M.: Foundations for the run-time analysis of software systems. Ph.D. thesis, University of Pennsylvania (2000)
27.
Zurück zum Zitat Yu, D., Chander, A., Islam, N., Serikov, I.: Javascript instrumentation for browser security. In: Proceedings of the Symposium on Principles of Programming Languages, pp. 237–249 (2007) Yu, D., Chander, A., Islam, N., Serikov, I.: Javascript instrumentation for browser security. In: Proceedings of the Symposium on Principles of Programming Languages, pp. 237–249 (2007)
Metadaten
Titel
Modeling runtime enforcement with mandatory results automata
verfasst von
Egor Dolzhenko
Jay Ligatti
Srikar Reddy
Publikationsdatum
01.02.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 1/2015
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-014-0239-8

Weitere Artikel der Ausgabe 1/2015

International Journal of Information Security 1/2015 Zur Ausgabe