Combining static and dynamic analysis for automatic identification of precise access-control policies

被引:9
|
作者
Centonze, Paolina [1 ]
Flynn, Robert J. [2 ]
Pistoia, Marco [1 ]
机构
[1] IBM Watson Res Ctr, New York, NY USA
[2] Polytech Univ, Brooklyn, NY USA
关键词
D O I
10.1109/ACSAC.2007.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given a large component-based program, it may be very complex to identify an optimal access-control policy, allowing the program to execute with no authorization failures and no violations of the Principle of Least Privilege. This paper presents a novel combination of static and dynamic analysis for automatic determination of precise access-control policies for programs that will be executed on Stack-Based Access Control systems, such as Java and the Common Language Runtime (CLR). The static analysis soundly models the execution of the program taking into account native methods, reflection, and multi-threaded code. The dynamic analysis interactively refines the potentially conservative results of the static analysis, with no need for writing or generating test cases or for restarting the system if an authorization failure occurs during testing, and no risk of corrupting the underlying system on which the analysis is performed. We implemented the analysis framework presented by this paper in an analysis tool for Java programs, called Access-Control Explorer (ACE). ACE allows for automatic, safe, and precise identification of access-right requirements and library-code locations that should be made privilege-asserting to prevent client code from requiring unnecessary access rights. This paper presents experimental results obtained on large production-level applications.
引用
收藏
页码:292 / +
页数:3
相关论文
共 50 条
  • [41] Adventures in the Analysis of Access Control Policies
    Anh Truong
    [J]. FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019), 2019, 11814 : 467 - 482
  • [42] Testing and analysis of access control policies
    Martin, Evan
    [J]. 29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: ICSE 2007 COMPANION VOLUME, PROCEEDINGS, 2007, : 75 - 76
  • [43] Formal analysis of access control policies
    Bryans, Jeremy W.
    [J]. PROCEEDINGS OF THE UK E-SCIENCE ALL HANDS MEETING 2006, 2006, : 701 - 708
  • [44] Field access analysis for enforcing access control policies
    Lehmann, Kathrin
    Thiemann, Peter
    [J]. EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
  • [45] A comprehensive approach to the automatic refinement and verification of access control policies
    Cherninod, Manuel
    Durante, Luca
    Seno, Lucia
    Valenza, Fulvio
    Valenzano, Adriano
    [J]. COMPUTERS & SECURITY, 2019, 80 : 186 - 199
  • [46] Specifying and enforcing constraints in dynamic access control policies
    Essaouini, Nada
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    El Kalam, Anas Abou
    [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 290 - 297
  • [47] Theoretical Analysis of EDCA Medium Access-Control Method in Simplified Network Environment
    Rajmic, Pavel
    Komosny, Dan
    Molnar, Karol
    [J]. 2009 EIGHTH INTERNATIONAL CONFERENCE ON NETWORKS, 2009, : 197 - 201
  • [48] DYNAMIC BANDWIDTH ALLOCATION AND ACCESS-CONTROL OF VIRTUAL PATHS IN ATM BROAD-BAND NETWORKS
    HABIB, IW
    SAADAWI, TN
    [J]. HIGH PERFORMANCE NETWORKING, IV, 1993, 14 : 49 - 64
  • [49] Automatic Extraction of Access Control Policies from Natural Language Documents
    Narouei, Masoud
    Takabi, Hassan
    Nielsen, Rodney
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 506 - 517
  • [50] Dynamic Analysis of Usage Control Policies
    Elrakaiby, Yehia
    Pang, Jun
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 88 - 100