Run-Time Enforcement of Nonsafety Policies

被引:105
|
作者
Ligatti, Jay [1 ]
Bauer, Lujo [2 ]
Walker, David [3 ]
机构
[1] Univ S Florida, Tampa, FL 33620 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[3] Princeton Univ, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Security; Theory; Security policies; safety; liveness; monitoring; security automata; policy enforcement; SAFETY;
D O I
10.1145/1455526.1455532
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A common mechanism for ensuring that software behaves securely is to monitor programs at run time and check that they dynamically adhere to constraints specified by a security policy. Whenever a program monitor detects that untrusted software is attempting to execute a dangerous action, it takes remedial steps to ensure that only safe code actually gets executed. This article improves our understanding of the space of policies enforceable by monitoring the run-time behaviors of programs. We begin by building a formal framework for analyzing policy enforcement: we precisely define policies, monitors, and enforcement. This framework allows us to prove that monitors enforce an interesting set of policies that we call the infinite renewal properties. We show how to construct a program monitor that provably enforces any reasonable infinite renewal property. We also show that the set of infinite renewal properties includes some nonsafety policies, that is, that monitors can enforce some nonsafety (including some purely liveness) policies. Finally, we demonstrate concrete examples of nonsafety policies enforceable by practical run-time monitors.
引用
收藏
页数:41
相关论文
共 50 条
  • [1] On run-time enforcement of policies
    Shah, Harshit
    Shyamasundar, R. K.
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 268 - +
  • [2] Edit automata: Enforcement mechanisms for run-time security policies
    Ligatti J.
    Bauer L.
    Walker D.
    [J]. International Journal of Information Security, 2005, 4 (1-2) : 2 - 16
  • [3] Contract representation for run-time monitoring and enforcement
    Molina-Jimenez, C
    Shrivastava, S
    Solaiman, E
    Warne, J
    [J]. IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 103 - 110
  • [4] Gate automata-driven run-time enforcement
    Costa, Gabriele
    Matteucci, Ilaria
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 518 - 524
  • [5] Practical Run-Time Norm Enforcement with Bounded Lookahead
    Alechina, Natasha
    Bulling, Nils
    Dastani, Mehdi
    Logan, Brian
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 443 - 451
  • [6] Model-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
    Ben Fadhel, Ameni
    Bianculli, Domenico
    Briand, Lionel C.
    [J]. PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, : 248 - 258
  • [7] Specification and optimal reactive synthesis of run-time enforcement shields
    Pandya, Paritosh K.
    Wakankar, Amol
    [J]. INFORMATION AND COMPUTATION, 2022, 285
  • [8] Specification and Optimal Reactive Synthesis of Run-time Enforcement Shields
    Pandya, Paritosh K.
    Wakankar, Amol
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2019, (305): : 91 - 106
  • [9] Run-time Requirement Enforcement for Loop Programs on Processor Arrays
    Witterauf, Michael
    Teich, Juergen
    [J]. PROCEEDINGS OF THE 2018 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2018, : 22 - 32
  • [10] Analysis and run-time verification of dynamic security policies
    Janicke, Helge
    Siewe, Frangois
    Jones, Kevin
    Cau, Antonio
    Zedan, Hussein
    [J]. DEFENCE APPLICATIONS OF MULTI-AGENT SYSTEMS, 2006, 3890 : 92 - 103