Combining static and dynamic analysis for automatic identification of precise access-control policies

被引:9
|
作者
Centonze, Paolina [1 ]
Flynn, Robert J. [2 ]
Pistoia, Marco [1 ]
机构
[1] IBM Watson Res Ctr, New York, NY USA
[2] Polytech Univ, Brooklyn, NY USA
关键词
D O I
10.1109/ACSAC.2007.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given a large component-based program, it may be very complex to identify an optimal access-control policy, allowing the program to execute with no authorization failures and no violations of the Principle of Least Privilege. This paper presents a novel combination of static and dynamic analysis for automatic determination of precise access-control policies for programs that will be executed on Stack-Based Access Control systems, such as Java and the Common Language Runtime (CLR). The static analysis soundly models the execution of the program taking into account native methods, reflection, and multi-threaded code. The dynamic analysis interactively refines the potentially conservative results of the static analysis, with no need for writing or generating test cases or for restarting the system if an authorization failure occurs during testing, and no risk of corrupting the underlying system on which the analysis is performed. We implemented the analysis framework presented by this paper in an analysis tool for Java programs, called Access-Control Explorer (ACE). ACE allows for automatic, safe, and precise identification of access-right requirements and library-code locations that should be made privilege-asserting to prevent client code from requiring unnecessary access rights. This paper presents experimental results obtained on large production-level applications.
引用
收藏
页码:292 / +
页数:3
相关论文
共 50 条
  • [21] HYBRID OPTICAL DIGITAL ACCESS-CONTROL USING FINGERPRINT IDENTIFICATION
    CHEN, ZK
    SUN, Y
    ZHANG, YX
    MU, GG
    [J]. OPTICAL ENGINEERING, 1995, 34 (03) : 834 - 839
  • [22] ANALYSIS AND TUNING OF THE FDDI MEDIA ACCESS-CONTROL PROTOCOL
    DYKEMAN, D
    BUX, W
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1988, 6 (06) : 997 - 1010
  • [23] Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems
    Martinez, Salvador
    Garcia-Alfaro, Joaquin
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Cabot, Jordi
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 218 - 233
  • [24] LANGUAGE EXTENSIONS FOR SPECIFYING PROGRAM ACCESS-CONTROL POLICIES IN PROGRAMMING-LANGUAGES
    CLAYBROOK, BG
    HARTSON, HR
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 1983, 3 (02) : 155 - 162
  • [25] An access-control model for Body Sensor Networks using authorisation policies.
    Katsiri, Eleftheria
    [J]. 2008 5TH INTERNATIONAL SUMMER SCHOOL AND SYMPOSIUM ON MEDICAL DEVICES AND BIOSENSORS, 2008, : 201 - 206
  • [26] ANALYSIS AND IMPROVEMENT OF AN ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION
    YEN, SM
    LAIH, CS
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05): : 271 - 273
  • [27] CONTROLLING THE DEPENDENCY OF USER ACCESS-CONTROL MECHANISMS ON CORRECTNESS OF USER IDENTIFICATION
    OSHEA, G
    [J]. COMPUTER JOURNAL, 1988, 31 (06): : 503 - 509
  • [28] PERFORMANCE ANALYSIS OF AN ACCESS-CONTROL STRATEGY IN INTEGRATED NETWORKS
    ATMACA, T
    PUJOLLE, G
    FEI, S
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1992, 24 (05): : 421 - 434
  • [29] Towards Automatic Repair of Access Control Policies
    Xu, Dianxiang
    Peng, Shuai
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [30] A DYNAMIC ACCESS-CONTROL SCHEME BASED UPON THE KNAPSACK-PROBLEM
    JAN, JK
    WANG, SJ
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (12) : 75 - 86