Combining static and dynamic analysis for automatic identification of precise access-control policies

被引:9
|
作者
Centonze, Paolina [1 ]
Flynn, Robert J. [2 ]
Pistoia, Marco [1 ]
机构
[1] IBM Watson Res Ctr, New York, NY USA
[2] Polytech Univ, Brooklyn, NY USA
关键词
D O I
10.1109/ACSAC.2007.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given a large component-based program, it may be very complex to identify an optimal access-control policy, allowing the program to execute with no authorization failures and no violations of the Principle of Least Privilege. This paper presents a novel combination of static and dynamic analysis for automatic determination of precise access-control policies for programs that will be executed on Stack-Based Access Control systems, such as Java and the Common Language Runtime (CLR). The static analysis soundly models the execution of the program taking into account native methods, reflection, and multi-threaded code. The dynamic analysis interactively refines the potentially conservative results of the static analysis, with no need for writing or generating test cases or for restarting the system if an authorization failure occurs during testing, and no risk of corrupting the underlying system on which the analysis is performed. We implemented the analysis framework presented by this paper in an analysis tool for Java programs, called Access-Control Explorer (ACE). ACE allows for automatic, safe, and precise identification of access-right requirements and library-code locations that should be made privilege-asserting to prevent client code from requiring unnecessary access rights. This paper presents experimental results obtained on large production-level applications.
引用
收藏
页码:292 / +
页数:3
相关论文
共 50 条
  • [31] Dynamic adaptation of access control policies
    Bharadwaj, V
    Baras, J
    [J]. MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 761 - 766
  • [32] ANALYSIS OF TRAFFIC ACCESS-CONTROL STRATEGIES IN INTEGRATED SERVICE NETWORKS
    KRAIMECHE, B
    SCHWARTZ, M
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1985, 33 (10) : 1085 - 1093
  • [33] Analysis of stability, static and dynamic accuracy of automatic control systems with selector
    Petunin, VI
    Frid, AI
    [J]. IZVESTIYA VYSSHIKH UCHEBNYKH ZAVEDENII AVIATSIONAYA TEKHNIKA, 1999, (02): : 16 - 20
  • [34] Distributed clinical data sharing via dynamic access-control policy transformation
    Rezaeibagha, Fatemeh
    Mu, Yi
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2016, 89 : 25 - 31
  • [35] Conformance Checking of Dynamic Access Control Policies
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, 2011, 6991 : 227 - 242
  • [36] Dynamic Access Control Policies: Specification and Verification
    Janicke, H.
    Cau, A.
    Siewe, F.
    Zedan, H.
    [J]. COMPUTER JOURNAL, 2013, 56 (04): : 440 - 463
  • [37] A NEW DYNAMIC ACCESS-CONTROL SCHEME BASED ON SUBJECT-OBJECT LIST
    HWANG, MS
    YANG, WP
    [J]. DATA & KNOWLEDGE ENGINEERING, 1994, 14 (01) : 45 - 56
  • [38] OPTIMAL CHANNEL ALLOCATION POLICIES FOR ACCESS-CONTROL OF CIRCUIT-SWITCHED TRAFFIC IN ISDN ENVIRONMENTS
    MEEMPAT, G
    SUNDARESHAN, MK
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1993, 41 (02) : 338 - 350
  • [39] GROUP HYBRID ACCESS-CONTROL DISCIPLINE FOR MULTIACCESS CHANNELS - A THROUGHPUT ANALYSIS
    GRZECH, A
    [J]. SYSTEMS ANALYSIS MODELLING SIMULATION, 1990, 7 (04): : 267 - 287
  • [40] DESIGN AND ANALYSIS OF A HYBRID ACCESS-CONTROL TO AN OPTICAL STAR USING WDM
    OFEK, Y
    SIDI, M
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1993, 17 (03) : 259 - 265