Combining static and dynamic analysis for automatic identification of precise access-control policies

被引:9
|
作者
Centonze, Paolina [1 ]
Flynn, Robert J. [2 ]
Pistoia, Marco [1 ]
机构
[1] IBM Watson Res Ctr, New York, NY USA
[2] Polytech Univ, Brooklyn, NY USA
关键词
D O I
10.1109/ACSAC.2007.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given a large component-based program, it may be very complex to identify an optimal access-control policy, allowing the program to execute with no authorization failures and no violations of the Principle of Least Privilege. This paper presents a novel combination of static and dynamic analysis for automatic determination of precise access-control policies for programs that will be executed on Stack-Based Access Control systems, such as Java and the Common Language Runtime (CLR). The static analysis soundly models the execution of the program taking into account native methods, reflection, and multi-threaded code. The dynamic analysis interactively refines the potentially conservative results of the static analysis, with no need for writing or generating test cases or for restarting the system if an authorization failure occurs during testing, and no risk of corrupting the underlying system on which the analysis is performed. We implemented the analysis framework presented by this paper in an analysis tool for Java programs, called Access-Control Explorer (ACE). ACE allows for automatic, safe, and precise identification of access-right requirements and library-code locations that should be made privilege-asserting to prevent client code from requiring unnecessary access rights. This paper presents experimental results obtained on large production-level applications.
引用
收藏
页码:292 / +
页数:3
相关论文
共 50 条
  • [1] Automatic Error Finding in Access-Control Policies
    Jayaraman, Karthick
    Ganesh, Vijay
    Tripunitara, Mahesh
    Rinard, Martin
    Chapin, Steve
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 163 - 174
  • [2] Dynamic access-control policies on XML encrypted data
    Bouganim, Luc
    Ngoc, Francois Dang
    Pucheral, Philippe
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
  • [3] Specifying and reasoning about dynamic access-control policies
    Dougherty, Daniel J.
    Fisler, Kathi
    Krishnamurthi, Shriram
    [J]. AUTOMATED REASONING, PROCEEDINGS, 2006, 4130 : 632 - 646
  • [4] Verification and change-impact analysis of access-control policies
    Fisler, K
    Krishnamurthi, S
    Meyerovich, LA
    Tschantz, MC
    [J]. ICSE 05: 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2005, : 196 - 205
  • [5] ON THE STATIC ACCESS-CONTROL MECHANISM IN CONCURRENT PASCAL
    KIEBURTZ, R
    SILBERSCHATZ, A
    [J]. COMPUTER JOURNAL, 1982, 25 (01): : 17 - 21
  • [6] DYNAMIC ACCESS-CONTROL FOR RELATIONAL VIEWS
    ROUSSOPOULOS, N
    BADER, C
    [J]. INFORMATION SYSTEMS, 1985, 10 (03) : 361 - 369
  • [7] ACCESS-CONTROL BY MEANS OF AUTOMATIC SPEAKER VERIFICATION
    KUHN, MH
    [J]. JOURNAL OF PHYSICS E-SCIENTIFIC INSTRUMENTS, 1980, 13 (01): : 85 - 86
  • [8] EXTENDING THE ISO ACCESS-CONTROL FRAMEWORK FOR MULTIPLE POLICIES
    ABRAMS, MD
    JOYCE, MV
    [J]. COMPUTER SECURITY, 1993, 37 : 343 - 358
  • [9] Context-aware adaptation of access-control policies
    Samuel, Arjmand
    Ghafoor, Arif
    Bertino, Elisa
    [J]. IEEE INTERNET COMPUTING, 2008, 12 (01) : 51 - 54
  • [10] Access-control policies via Belnap logic: Effective and efficient composition and analysis
    Bruns, Glenn
    Huth, Michael
    [J]. CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 163 - +